07}) finit_module(r1, 0x0, 0x4) 04:02:41 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:02:41 executing program 5: time(&(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) setsockopt$inet6_mreq(r0, 0x29, 0x14, 0x0, 0x0) [ 609.699574] FAULT_INJECTION: forcing a failure. [ 609.699574] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 609.700600] CPU: 1 UID: 0 PID: 6509 Comm: syz-executor.6 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 609.700619] Tainted: [W]=WARN [ 609.700623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 609.700631] Call Trace: [ 609.700636] [ 609.700641] dump_stack_lvl+0xfa/0x120 [ 609.700664] should_fail_ex+0x4d7/0x5e0 [ 609.700690] _copy_to_user+0x32/0xd0 [ 609.700716] simple_read_from_buffer+0xe0/0x180 [ 609.700745] proc_fail_nth_read+0x18a/0x240 [ 609.700762] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 609.700775] ? security_file_permission+0x22/0x90 [ 609.700806] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 609.700819] vfs_read+0x1eb/0xc70 [ 609.700846] ? __pfx___mutex_lock+0x10/0x10 [ 609.700862] ? __fget_files+0x34/0x3b0 [ 609.700889] ? __pfx_vfs_read+0x10/0x10 [ 609.700910] ? lock_release+0xc8/0x270 [ 609.700929] ? __fget_files+0x20d/0x3b0 [ 609.700953] ksys_read+0x121/0x240 [ 609.700970] ? __pfx_ksys_read+0x10/0x10 [ 609.700993] do_syscall_64+0xbf/0x420 [ 609.701009] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 609.701022] RIP: 0033:0x7efe4fc9d69c [ 609.701031] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 04:02:41 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) [ 609.701043] RSP: 002b:00007efe4d260170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 609.701054] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe4fc9d69c [ 609.701062] RDX: 000000000000000f RSI: 00007efe4d2601e0 RDI: 0000000000000004 [ 609.701069] RBP: 00007efe4d2601d0 R08: 0000000000000000 R09: 0000000000000000 [ 609.701076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 609.701082] R13: 00007ffd2cb6076f R14: 00007efe4d260300 R15: 0000000000022000 [ 609.701100] 04:02:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:02:52 executing program 2: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94p\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) fallocate(r4, 0x0, 0x7fff, 0x5) r5 = openat2(r3, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x300, 0x180, 0x3}, 0x18) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x81, 0x6, 0xa1, 0x77, 0x0, 0x7, 0x40002, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x8000, 0x5, 0x5, 0x6, 0x7, 0x200, 0x5, 0x0, 0x6, 0x0, 0x5}, 0x0, 0x4, r5, 0xb) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x1c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4880}, 0x4048000) finit_module(r0, 0x0, 0x6) openat2(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0xc0, 0x4, 0x2}, 0x18) 04:02:52 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x1c00) 04:02:52 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:02:52 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:02:52 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:02:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x8, 0x1, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7fff}, 0x80, 0x9, 0x2e, 0x0, 0x8001, 0x0, 0x8a81, 0x0, 0x9, 0x0, 0xfffffffffffffffb}, 0x0, 0x3, 0xffffffffffffffff, 0xd7ede9b8d2555a0a) r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="ac", 0x1, r1) dup(r0) keyctl$clear(0x7, r1) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) write(r2, &(0x7f0000000900)="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", 0x200) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20040, 0x100) fcntl$setstatus(r2, 0x4, 0x44000) sendfile(r2, r3, 0x0, 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) 04:02:52 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) pread64(r1, &(0x7f0000000080)=""/130, 0x82, 0x58e) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x2, &(0x7f0000000040)=[{0x3f, 0x0, 0x0, 0xfffff01c}, {0x6, 0x0, 0x0, 0x100}]}, 0x10) io_setup(0x80000000, &(0x7f0000000000)=0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x10480, 0x0) io_submit(r2, 0x1, &(0x7f0000000240)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x9, r3, &(0x7f00000003c0)="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", 0x1000, 0x0, 0x0, 0x2}]) r4 = socket(0x29, 0x3, 0x0) r5 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r5, 0x9) finit_module(r5, 0x0, 0x6) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000180)=ANY=[@ANYBLOB="010400fe01fa17c019c4", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) 04:02:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:02:52 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:03:02 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0xaf07) 04:03:02 executing program 3: set_mempolicy(0x6, &(0x7f0000000040)=0x7, 0x5db) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{}]}) set_mempolicy(0x4000, &(0x7f0000000140)=0x6, 0x7fffffff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) 04:03:02 executing program 5: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x103483) io_setup(0x572, &(0x7f0000000140)=0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r2) io_submit(r1, 0x3, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 04:03:02 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7, 0x5, 0x80, 0x9, 0x0, 0x6, 0x48000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8000, 0x2, @perf_config_ext={0x20}, 0x800, 0x7fff, 0x1000, 0x2, 0x7, 0x6, 0x100, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0x1, r3, 0x0) finit_module(r0, 0x0, 0x6) 04:03:02 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:03:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:02 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x2, r0, 0x0, 0x0) 04:03:02 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, 0x0, 0x0, 0x0) [ 630.462153] audit: type=1326 audit(1765512182.633:29): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6559 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f127058cb19 code=0x0 04:03:02 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, 0x0, 0x0, 0x0) 04:03:02 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:03:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:02 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x64e96) [ 630.601510] audit: type=1326 audit(1765512182.772:30): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6559 comm="syz-executor.3" exe="/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f127058cb19 code=0x0 04:03:02 executing program 5: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x103483) io_setup(0x572, &(0x7f0000000140)=0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r2) io_submit(r1, 0x3, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 04:03:02 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:03:02 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, 0x0, 0x0, 0x0) 04:03:02 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x3, r0, 0x0, 0x0) 04:03:02 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xb22}, 0x1020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) 04:03:02 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0xaf07) 04:03:13 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='oom_adj\x00') write$P9_RREAD(r0, &(0x7f0000000000)={0x30, 0x75, 0x0, {0x25, "09ecc1f2ec95ad11d7b8376ef52c967c5e152255f037e52f63af82783ec80cbbfbc18e4859"}}, 0x30) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x76040, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @remote}, &(0x7f00000000c0)=0x8) 04:03:13 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x80000) 04:03:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:13 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:03:13 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x5, r0, 0x0, 0x0) 04:03:13 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) finit_module(r0, 0x0, 0x6) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x105040, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000300)={0xa, &(0x7f0000000280)=[{0x7, 0xa, 0x4a, 0x9}, {0xfffd, 0x1, 0x6, 0x7}, {0xff80, 0x7f, 0x81, 0x80000000}, {0xc2, 0x0, 0x6, 0x7}, {0x4, 0x2, 0x80, 0x1}, {0xfbff, 0x80, 0x1b, 0x6}, {0x4, 0x2, 0xc0, 0x3cb6}, {0xfbff, 0x8, 0x2, 0x200020}, {0x99df, 0xf3, 0x5, 0x7}, {0xf801, 0x2, 0x3f, 0x8}]}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="686737499d74"}, 0x14) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000040)={'gretap0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="00200010000000ff000000094ea500380067000005049078ac1e010100000000890f3cac14140a64010101ac1e01012186058ed17e00830b5fe00000027f000011000000"]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000003c0)={0x3, [0x0, 0x0, 0x0]}) 04:03:13 executing program 3: ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(0xffffffffffffffff, 0x80489439, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x8}, 0x100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2ff, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) fchdir(r2) read(r0, &(0x7f0000000200)=""/3, 0x3) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000002c0)={0x3, 0x1, 0x1, 0x24, 0xa, [{0x7, 0xe9, 0x20, '\x00', 0x482}, {0x1, 0x9, 0x9, '\x00', 0x800}, {0x400, 0x101, 0x9}, {0x101, 0x6, 0x1f, '\x00', 0x1005}, {0x6, 0x6, 0x20}, {0x0, 0x6, 0x398, '\x00', 0x1a00}, {0x0, 0x9, 0x7ff, '\x00', 0x1001}, {0x7000, 0x9, 0x800, '\x00', 0x2d00}, {0x2, 0x8, 0x8, '\x00', 0x802}, {0x0, 0x7, 0x6}]}) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 04:03:13 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) (fail_nth: 1) [ 641.108437] FAULT_INJECTION: forcing a failure. [ 641.108437] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 641.109468] CPU: 1 UID: 0 PID: 6617 Comm: syz-executor.7 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 641.109487] Tainted: [W]=WARN [ 641.109491] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 641.109498] Call Trace: [ 641.109502] [ 641.109507] dump_stack_lvl+0xfa/0x120 [ 641.109528] should_fail_ex+0x4d7/0x5e0 [ 641.109548] _copy_to_user+0x32/0xd0 [ 641.109567] simple_read_from_buffer+0xe0/0x180 [ 641.109586] proc_fail_nth_read+0x18a/0x240 [ 641.109603] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 641.109616] ? security_file_permission+0x22/0x90 [ 641.109643] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 641.109657] vfs_read+0x1eb/0xc70 [ 641.109677] ? __pfx___mutex_lock+0x10/0x10 [ 641.109691] ? __fget_files+0x34/0x3b0 [ 641.109710] ? __pfx_vfs_read+0x10/0x10 [ 641.109732] ? lock_release+0xc8/0x270 [ 641.109750] ? __fget_files+0x20d/0x3b0 [ 641.109775] ksys_read+0x121/0x240 [ 641.109792] ? __pfx_ksys_read+0x10/0x10 [ 641.109816] do_syscall_64+0xbf/0x420 [ 641.109832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 641.109844] RIP: 0033:0x7f8ea3de269c [ 641.109854] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 641.109865] RSP: 002b:00007f8ea13a5170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 641.109876] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8ea3de269c [ 641.109884] RDX: 000000000000000f RSI: 00007f8ea13a51e0 RDI: 0000000000000004 [ 641.109891] RBP: 00007f8ea13a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 641.109898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 641.109905] R13: 00007fffb48a6d5f R14: 00007f8ea13a5300 R15: 0000000000022000 [ 641.109923] [ 641.149909] syz-executor.5 (6626): /proc/6626/oom_adj is deprecated, please use /proc/6626/oom_score_adj instead. 04:03:13 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x6, r0, 0x0, 0x0) 04:03:13 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:03:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:13 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:03:13 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x5, 0x0) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) clone3(&(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffa) keyctl$link(0x8, r1, 0xffffffffffffffff) 04:03:13 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0xe0ffff) 04:03:13 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x7, r0, 0x0, 0x0) 04:03:13 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={0x0, @xdp={0x2c, 0x0, 0x0, 0x34}, @in={0x2, 0x4e24, @empty}, @llc={0x1a, 0xffff, 0x1, 0xff, 0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x10000000007f, 0x2}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x3}}, 0x0, r6}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, 0x0, 0x40}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000240)=ANY=[@ANYBLOB="dc0100001800000125bd7000fedbdf25000000000000000000000000000000000a0101020000000000000000000000004e2404014e2300000000000000000000005232c5631a1d434f42f8ca5776bd6687aacaf5d7eb633396643b56b9bf4c6651c3acf092efcc9e6878d11a5d78", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0a010100000000000000000000000000000004d33300000064010100000000000000000000000000c5ffffffffffffff05000000000000000104000000000000210000000000000000000000000000004000000000000000030000000000000000fcffffffffffff0104000000000000d10200000000000009000000000000000800000000000000000800bb0200000002000027bd70000740bf49916e7bb313eb5f1b3500000a0006060200000000000000b500000000000000e4000600fe800000000000000000000000000037000000000000000000000000000000004e20009b4e23", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="ac1414aa000000000000000000000000000004d46c00000000000000000000000000000000000000dd0e0000000000004d0000000000000000010000000000000200000000000000060000000000000005000000000000001f00000000000000000005000000000000005f9300000000000008000000000000002000000007000000500f000028bd700007350000060002d64700"/168], 0x1dc}, 0x1, 0x0, 0x0, 0x4000011}, 0x40084) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ll={0x11, 0xf5, r3, 0x1, 0x4, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xf}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000200)="f367f041c470da6da401aca4a15f7894e27eba90d9e338f4d5f3c06f888f264896603bdb69b8", 0x26}], 0x1, &(0x7f0000000480)=ANY=[@ANYRES32=r7], 0x3d0}, 0x0, 0x8000000, 0x1, {0x0, r8}}, 0x6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd, 0x0, 0x0, 0x9c, 0x5, 0x0, {0x0, r8}}, 0x3000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index, 0x3f, 0x0, 0x0, 0x0, 0x1, {0x0, r8}}, 0x3f) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, r2, &(0x7f0000000000)=0x80, &(0x7f0000000200)=@l2tp={0x2, 0x0, @broadcast}, 0x0, 0x0, 0x1, {0x0, r8}}, 0x4dc542af) 04:03:13 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x1000000) 04:03:13 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000140)=0x2) syz_emit_ethernet(0x12e, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "409d26", 0xf8, 0x88, 0x0, @private0, @local, {[@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x30, 0x6c1c}, @hopopts={0x0, 0x4, '\x00', [@ra, @padn={0x1, 0x1, [0x0]}, @generic={0x0, 0x2, "cce8"}, @ra, @hao={0xc9, 0x10, @dev}]}, @fragment, @dstopts={0x0, 0x14, '\x00', [@pad1, @ra, @generic={0x0, 0x30, "fd8e4e6ed0a7d7d86f0b17cdf2ca8b3910780642759888bf2adfe16d6ef408f4fe1e072a3f51d9d9432a787ffa4fbc07"}, @generic={0x0, 0x66, "3e18c2753612328daa9b5cb0a8fe424530bbca15c3609090eaeea7f45a29b37d59de6042c25e49b8b0c1a9b65d9e7f9997345e42bf296f2c34802e6330b6b7890b8b4d8e3efacfdee846e63609e5e6c41382579d4cad8d941aa5360b9f722532b32fa685a4ce"}]}], {0x0, 0x0, 0x8}}}}}}, 0x0) 04:03:13 executing program 3: ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff}}) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc0c0583b, &(0x7f0000000000)) creat(&(0x7f00000000c0)='./file0\x00', 0x1c) 04:03:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:23 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x2, r0, 0x0, 0x0) 04:03:23 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x8, r0, 0x0, 0x0) 04:03:23 executing program 3: clock_gettime(0x0, &(0x7f00000063c0)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000061c0)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/184, 0xb8}], 0x2}}, {{&(0x7f0000000300), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000380)=""/187, 0xbb}, {&(0x7f0000000440)=""/178, 0xb2}], 0x2, &(0x7f0000000540)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000000580)=@abs, 0x6e, &(0x7f0000002a40)=[{&(0x7f0000000600)=""/157, 0x9d}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/137, 0x89}, {&(0x7f0000002780)=""/33, 0x21}, {&(0x7f00000027c0)=""/152, 0x98}, {&(0x7f0000002880)=""/235, 0xeb}, {&(0x7f0000002980)=""/186, 0xba}], 0x8, &(0x7f0000002ac0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x58}}, {{0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000002b40)=""/180, 0xb4}, {&(0x7f0000002c00)=""/209, 0xd1}], 0x2}}, {{&(0x7f0000002d40)=@abs, 0x6e, &(0x7f00000040c0)=[{&(0x7f0000002dc0)=""/81, 0x51}, {&(0x7f0000002e40)=""/39, 0x27}, {&(0x7f0000002e80)=""/4096, 0x1000}, {&(0x7f0000003e80)}, {&(0x7f0000003ec0)=""/112, 0x70}, {&(0x7f0000003f40)=""/37, 0x25}, {&(0x7f0000003f80)=""/40, 0x28}, {&(0x7f0000003fc0)=""/5, 0x5}, {&(0x7f0000004000)=""/150, 0x96}], 0x9, &(0x7f0000004180)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}}, {{&(0x7f00000041c0)=@abs, 0x6e, &(0x7f00000056c0)=[{&(0x7f0000004240)=""/38, 0x26}, {&(0x7f0000004280)=""/58, 0x3a}, {&(0x7f00000042c0)=""/167, 0xa7}, {&(0x7f0000004380)=""/25, 0x19}, {&(0x7f00000043c0)=""/143, 0x8f}, {&(0x7f0000004480)=""/227, 0xe3}, {&(0x7f0000004580)=""/213, 0xd5}, {&(0x7f0000004680)}, {&(0x7f00000046c0)=""/4096, 0x1000}], 0x9, &(0x7f0000005780)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f0000005840)=@abs, 0x6e, &(0x7f0000005b00)=[{&(0x7f00000058c0)=""/237, 0xed}, {&(0x7f00000059c0)=""/72, 0x48}, {&(0x7f0000005a40)=""/163, 0xa3}], 0x3, &(0x7f0000005b40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}, {{&(0x7f0000005c40)=@abs, 0x6e, &(0x7f00000060c0)=[{&(0x7f0000005cc0)=""/166, 0xa6}, {&(0x7f0000005d80)=""/203, 0xcb}, {&(0x7f0000005e80)=""/59, 0x3b}, {&(0x7f0000005ec0)=""/195, 0xc3}, {&(0x7f0000005fc0)=""/14, 0xe}, {&(0x7f0000006000)=""/175, 0xaf}], 0x6, &(0x7f0000006140)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}}], 0x8, 0x0, &(0x7f0000006400)={r0, r1+60000000}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r6, 0x40605346, &(0x7f0000006440)={0x1, 0x0, {0xffffffffffffffff, 0x0, 0x1, 0x3, 0x4}, 0x1}) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000003e80), 0x10580, 0x0) clock_gettime(0x0, &(0x7f00000064c0)={0x0, 0x0}) ppoll(&(0x7f0000004680)=[{r7, 0x4206}, {r4, 0x2404}, {r5, 0x8201}, {r3, 0x1000}, {r2, 0x360}], 0x5, &(0x7f0000006500)={r8, r9+10000000}, &(0x7f0000006540)={[0xafbe]}, 0x8) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r10, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x2, [{}, {}]}, 0x48) 04:03:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:23 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x7, 0x1f, 0x0, 0x7f, 0x0, 0xb90, 0x0, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x17e, 0x0, @perf_bp, 0x44000, 0xfffffffffffffffb, 0x4, 0x2, 0x4, 0x80, 0xff, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x5, r3, 0x8) 04:03:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x2000000) 04:03:23 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x5, 0x80}, 0x10, 0x0, 0x0, 0x1, 0x0, 0x6, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) close_range(r1, r2, 0x2) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_open_procfs(0x0, 0x0) pidfd_getfd(r3, r3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 04:03:23 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:03:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x3000000) 04:03:34 executing program 3: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e20, @private=0xa010102}, {0x1, @remote}, 0x8, {0x2, 0x4e22, @loopback}, 'lo\x00'}) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x400000000000}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001280), 0x2685c3, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000001240)='./cgroup/cgroup.procs\x00', 0x424200, 0x180) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0c7c000001000000060000041f02000000002219"], 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) open_by_handle_at(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="0c00000001001800060000008100000000000000"], 0x0) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/4096, 0x2, 0x5) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_WOWLAN(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032dbd7000fcdbdf254900000008000100300000000c0099000400000013000000fd6b6c8aff96fb3c11533a100925bc622c5bcecdfae84f7d42ebe38752fc3fe597a0ec7b2211542f4da70ed907483b8319d6950a5011841f297b99ff2b8f01a42bae6d246610457a11f19bfd9d772072d50fefe1cfa3dbf4155ce47251bee1e14068f0cbef6915b70799a27d30e988b1184b43dc0e5c2f4c13348e822ce3e86a546e2846270d6b0b8161522f6ac1a6c963ae"], 0x28}, 0x1, 0x0, 0x0, 0x804}, 0x8d4) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000002040)={0x0, 0x0, &(0x7f0000002000)={&(0x7f0000000280)={0x20, r4, 0x1, 0x0, 0x0, {0x18}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'syztnl2\x00', r6, 0x4, 0x9, 0x0, 0x9, 0xc, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x40, 0x700, 0xfff, 0xffffffff}}) 04:03:34 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x5, 0x80}, 0x10, 0x0, 0x0, 0x1, 0x0, 0x6, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) close_range(r1, r2, 0x2) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_open_procfs(0x0, 0x0) pidfd_getfd(r3, r3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 04:03:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:34 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x3, r0, 0x0, 0x0) 04:03:34 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x9, r0, 0x0, 0x0) 04:03:34 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, 0x0, 0x0, 0x0) 04:03:34 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000003c0)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xfd\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\xa7\x9f\xdd\x81\xdd\xe8\t\xa12P|@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80|\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8\xd2\x96,', 0x0) r1 = getpid() setpriority(0x0, r1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x6, 0x7, 0x29, 0xdb, 0x0, 0xa5, 0x1, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4725, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x10206, 0x7f, 0x7, 0x6, 0x691, 0x200, 0x0, 0x0, 0x4, 0x0, 0x5}, r1, 0xe, r4, 0x2) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) r5 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) getsockopt$packet_buf(r7, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x2f, 0x80, 0xb4, 0x3, 0x26, @empty, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x80, 0x8, 0x2}}) r8 = epoll_create1(0x80000) fcntl$addseals(r8, 0x409, 0x2) 04:03:34 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, 0x0, 0x0, 0x0) 04:03:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:34 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xa, r0, 0x0, 0x0) 04:03:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x4000000) 04:03:34 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x5, r0, 0x0, 0x0) 04:03:35 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x13) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) 04:03:35 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, 0x0, 0x0, 0x0) 04:03:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:35 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xb, r0, 0x0, 0x0) 04:03:35 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x5, 0x80}, 0x10, 0x0, 0x0, 0x1, 0x0, 0x6, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) close_range(r1, r2, 0x2) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_open_procfs(0x0, 0x0) pidfd_getfd(r3, r3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 04:03:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x5000000) 04:03:35 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x6, r0, 0x0, 0x0) 04:03:35 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) (fail_nth: 1) 04:03:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:35 executing program 2: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000200)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) fcntl$setflags(r1, 0x2, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x7) finit_module(r0, 0x0, 0x6) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xc6, 0x5, 0x3f, 0x3, 0x0, 0xffffffff, 0x61100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_config_ext={0x9, 0x2}, 0x1420, 0x401, 0x0, 0x9, 0x5, 0x6, 0x4, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x15) 04:03:35 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xc, r0, 0x0, 0x0) [ 663.276222] FAULT_INJECTION: forcing a failure. [ 663.276222] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 663.283656] CPU: 0 UID: 0 PID: 6763 Comm: syz-executor.4 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 663.283692] Tainted: [W]=WARN [ 663.283699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 663.283711] Call Trace: [ 663.283720] [ 663.283737] dump_stack_lvl+0xfa/0x120 [ 663.283777] should_fail_ex+0x4d7/0x5e0 [ 663.283828] _copy_to_user+0x32/0xd0 [ 663.283874] simple_read_from_buffer+0xe0/0x180 [ 663.283922] proc_fail_nth_read+0x18a/0x240 [ 663.283958] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 663.283991] ? security_file_permission+0x22/0x90 [ 663.284040] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 663.284071] vfs_read+0x1eb/0xc70 [ 663.284117] ? __pfx___mutex_lock+0x10/0x10 [ 663.284144] ? __fget_files+0x34/0x3b0 [ 663.284180] ? __pfx_vfs_read+0x10/0x10 [ 663.284221] ? lock_release+0xc8/0x270 [ 663.284268] ? __fget_files+0x20d/0x3b0 [ 663.284336] ksys_read+0x121/0x240 [ 663.284371] ? __pfx_ksys_read+0x10/0x10 [ 663.284436] do_syscall_64+0xbf/0x420 [ 663.284472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 663.284495] RIP: 0033:0x7f761664069c [ 663.284513] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 663.284533] RSP: 002b:00007f7613c03170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 663.284555] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f761664069c [ 663.284569] RDX: 000000000000000f RSI: 00007f7613c031e0 RDI: 0000000000000004 [ 663.284582] RBP: 00007f7613c031d0 R08: 0000000000000000 R09: 0000000000000000 [ 663.284594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 663.284607] R13: 00007ffcb81b7a5f R14: 00007f7613c03300 R15: 0000000000022000 [ 663.284671] 04:03:35 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x7, r0, 0x0, 0x0) 04:03:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6000000) 04:03:46 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:03:46 executing program 3: sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) recvmmsg$unix(r0, &(0x7f0000000400)=[{{&(0x7f0000000140), 0x6e, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/194, 0xc2}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000340)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x60}}], 0x1, 0x20, &(0x7f0000000440)={0x0, 0x3938700}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x20, 0x9, 0xe8, 0x0, 0x4, 0x801, 0xc2b1f502f2d5fd62, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa9c, 0x4, @perf_config_ext={0x3}, 0x0, 0x5000000, 0x4, 0x4, 0x1, 0x7, 0x800, 0x0, 0x1, 0x0, 0x9}, r1, 0x8, 0xffffffffffffffff, 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000001500)={0x3, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1fffffc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000000, 0x7f}, 0x0, 0x0, 0x0, 0x0, 0x8001, 0xf0000000, 0x0, 0x0, 0x0, 0x0, 0xfbfffffffffffffd}, r2, 0x1, 0xffffffffffffffff, 0x0) 04:03:46 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x7000000) 04:03:46 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0xbd, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7, 0x7, 0x5, 0x5, 0x0, 0x9, 0x80000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000200), 0x3}, 0x400, 0x2, 0x0, 0x9, 0x7, 0x1, 0x7fff, 0x0, 0x20, 0x0, 0x4}, 0x0, 0xf, r3, 0xa) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) lseek(r0, 0x80, 0x2) finit_module(r4, 0x0, 0x6) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x40, 0xf5, 0x4, 0x0, 0x7, 0x8040, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20, 0x4, @perf_config_ext={0x7fff, 0x3}, 0x240, 0x800, 0x7, 0x2, 0x835, 0x8, 0xfe8c, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 04:03:46 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xd, r0, 0x0, 0x0) 04:03:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:46 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x5, 0x80}, 0x10, 0x0, 0x0, 0x1, 0x0, 0x6, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) close_range(r1, r2, 0x2) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_open_procfs(0x0, 0x0) pidfd_getfd(r3, r3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 04:03:46 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x8, r0, 0x0, 0x0) 04:03:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:47 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xe, r0, 0x0, 0x0) 04:03:57 executing program 5: ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000080)={0x0, 0x0, 0xa11b, 0x5, 0x100}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x4840, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xa012, r0, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) 04:03:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:03:57 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x9, r0, 0x0, 0x0) 04:03:57 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) 04:03:58 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x9000000) 04:03:58 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x2, r0, 0x0, 0x0) 04:03:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x1) 04:03:58 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xf, r0, 0x0, 0x0) 04:03:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) [ 685.898573] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 685.899680] blk_print_req_error: 14 callbacks suppressed [ 685.899696] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 685.901774] buffer_io_error: 14 callbacks suppressed [ 685.901789] Buffer I/O error on dev sr0, logical block 0, async page read [ 685.920147] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 685.920636] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 685.921590] Buffer I/O error on dev sr0, logical block 1, async page read 04:03:58 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x10, r0, 0x0, 0x0) [ 685.936045] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 685.936975] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 685.938269] Buffer I/O error on dev sr0, logical block 2, async page read 04:03:58 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/40, 0x28}, {&(0x7f0000000200)=""/161, 0xa1}], 0x2) finit_module(r1, 0x0, 0x6) ioctl$int_in(r1, 0x5421, &(0x7f00000002c0)=0x100) 04:03:58 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x3, r0, 0x0, 0x0) [ 685.953115] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 685.954290] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 685.955873] Buffer I/O error on dev sr0, logical block 3, async page read 04:03:58 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xa, r0, 0x0, 0x0) [ 685.966866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 685.967692] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 685.969010] Buffer I/O error on dev sr0, logical block 4, async page read [ 685.980346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 685.981523] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 685.982950] Buffer I/O error on dev sr0, logical block 5, async page read [ 685.997962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 685.998821] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 686.000090] Buffer I/O error on dev sr0, logical block 6, async page read [ 686.025941] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 686.026803] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 686.028098] Buffer I/O error on dev sr0, logical block 7, async page read 04:04:14 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x5, r0, 0x0, 0x0) 04:04:14 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x11, r0, 0x0, 0x0) 04:04:14 executing program 5: r0 = syz_io_uring_setup(0x2260, &(0x7f0000003a00), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000003a80), &(0x7f0000003ac0)) r1 = dup(0xffffffffffffffff) ioctl$BLKSECTGET(0xffffffffffffffff, 0x2270, 0x0) r2 = syz_io_uring_setup(0x2260, &(0x7f0000003a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000003a80), &(0x7f0000003ac0)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x2270, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9d3b, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 04:04:14 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xb, r0, 0x0, 0x0) 04:04:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x34}]}) r0 = memfd_create(&(0x7f0000000680)='/proc/thread-self/attr/fscreate\x00\x14~\xfeG\xe1\x83\xc4\x8f\x9a\t\x00\x00\x00h\xd2oR\arV(C\xe7\x83\xd4\xbb\xb7\xc8t_XW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbwws9\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\x91\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5W\xcbC\xf0(=\'\xaa^kD\xf51f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb2\xb2S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8%\xde\x81\xd6|\x1a\x06\xc2kGb:~\xb7\xab\x1a\xd2\x9d\x86\x1dTL\xf0a\xf1\xb4\x04\\i0\x82\xa5\xbc\x04\x1c\xfb\x04\xaa\x81{\vk\xf5\xd9\xe9\x8c\xab\xcb\xa8\xec!\x18,\xe1\x190\xe0\x19 QM\xc1d\"\xf1P$3p\x15r)\xeb$\x16\x17p\x01\xde6\xef\x0f7\x8cg\x0f7\x1fZ3\xd0\xba\xdd\xce^V\x8f#f\xa7A\\\xcc-\xdb\x057u\xbdUB8\x0e\xa9tk.\xfe\xc0\xfe\x8dA\xb35\xf0\xedg\x17\xbe`6a\xfe.\xbd\x11L\xcb\xeaE\xe6\xa5\x14[\xc3\xd3\xd3&x\xf8\"\x00\x18~\x8d\xbd\xd7\nX`\xab\xb4\xbb&^\x00\x00\x00\x00\x00', 0x1) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) read(r0, &(0x7f0000000180)=""/181, 0xb5) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="55f4cbd299512f3a18000000", @ANYRES32=r3, @ANYRES32, @ANYRES32=0x0, @ANYBLOB='./file0\x00']) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) r6 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r8 = dup3(r6, r7, 0x0) getsockopt$packet_buf(r8, 0x107, 0x6, 0x0, &(0x7f0000000440)) r9 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) getsockopt$packet_buf(r11, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000280)) 04:04:14 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb228c5efe7cf62a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) dup2(r1, r2) 04:04:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:14 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x10000000) [ 702.276543] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 702.281116] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 702.285957] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 702.300758] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 702.301705] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 702.306600] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 702.313544] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 702.314453] Bluetooth: hci7: Opcode 0x0c1a failed: -4 04:04:14 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x1c000000) 04:04:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:14 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) ftruncate(r0, 0x8000) 04:04:14 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x12, r0, 0x0, 0x0) 04:04:14 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xc, r0, 0x0, 0x0) [ 702.410310] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 702.414507] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 702.419901] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 702.424598] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 702.429550] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 702.436086] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 702.436675] Bluetooth: hci6: Opcode 0x0c1a failed: -4 04:04:14 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x6, r0, 0x0, 0x0) [ 702.444200] Bluetooth: hci7: Opcode 0x0c1a failed: -4 04:04:14 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x964e0600) 04:04:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:14 executing program 3: setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040)={{0x33, @private=0xa010102, 0x4e24, 0x0, 'lblc\x00', 0x1, 0x2, 0x5c}, {@empty, 0x4e20, 0x2000, 0x2e, 0xfffffeff, 0x101}}, 0x44) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000005, 0x32, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) pread64(r0, 0x0, 0x2, 0x2000000) 04:04:14 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000003c0)='/proc/thD\xfa\xc4ek\x15!\x92\xec\xd6Bread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb9k\xb3\xc0\x02\xa4>\xb65\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7\xcc\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbCi\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[\x95\xd9\xca,\x8d\x89g\x1a\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa1`[oUAY\xa8\x93\xc5\x01\x00\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8\xfe\xb3\xe0v\xd1b)\xa0\x1f$\x8e\x91]\x10 \xd8\xd6\xe9.\x93\x1e\xcc\x91\xc0\x01\x13P3zP\xde\x146\xa2_\xd8=\xd5\v:u\xf5\xb8\xc2\xc0l\x01\x87\xf4?\v\v=B\xea\x0f\v](\xa1M\xc1T\xed\xd2\x10\x8b*\xcd\xa7\xd5\xb5\x94\v0 h\x1fpV3\x1a\x02\xe7N\xa9\x81i\xe61\xdcN\x0f\xa3}\x99P\xd7\x1b7\xe6\x00,\xda\x89Q\xe8j}\xfb\xf7g$b\xa4\x12k+\xcd!\x06\x81\xc8\x88\xc6\xf3\x8c', 0x2) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000005c0), 0x7f, 0x181001) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x3, 0x4, 0x0, 0x0, 0x2, 0x2, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x4000, 0x1, 0xc7, 0x8, 0x47, 0x7fff, 0x7fff, 0x0, 0x3, 0x0, 0x6}, r2, 0x10, r3, 0x2) ftruncate(r1, 0x9) ftruncate(r1, 0x8) finit_module(r1, 0x0, 0x6) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYBLOB="080000000000000009000000000000000002000000000000050000000000000009000000000000000800000000000000040000000000008006ffffe9e6a5ffff00020100000000000300000000000000fda1558aa2119e9a060000000000000007000000000000001000"/120]) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='mountstats\x00') 04:04:14 executing program 5: r0 = syz_io_uring_setup(0x2260, &(0x7f0000003a00), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000003a80), &(0x7f0000003ac0)) r1 = dup(0xffffffffffffffff) ioctl$BLKSECTGET(0xffffffffffffffff, 0x2270, 0x0) r2 = syz_io_uring_setup(0x2260, &(0x7f0000003a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000003a80), &(0x7f0000003ac0)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x2270, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9d3b, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) [ 702.602091] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 702.602770] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 702.604455] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 702.606598] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 702.607201] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 702.612198] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 702.614377] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 702.617495] Bluetooth: hci7: Opcode 0x0c1a failed: -4 [ 704.602874] Bluetooth: hci0: command 0x0c1a tx timeout [ 704.667854] Bluetooth: hci7: command 0x0c1a tx timeout [ 704.669375] Bluetooth: hci6: command 0x0c1a tx timeout [ 704.670532] Bluetooth: hci5: command 0x0c1a tx timeout [ 704.671601] Bluetooth: hci4: command 0x0c1a tx timeout [ 704.672839] Bluetooth: hci3: command 0x0c1a tx timeout [ 704.673999] Bluetooth: hci2: command 0x0c1a tx timeout [ 704.674986] Bluetooth: hci1: command 0x0c1a tx timeout 04:04:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201", 0x63, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:24 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x13, r0, 0x0, 0x0) 04:04:24 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x7, r0, 0x0, 0x0) 04:04:24 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x9, 0x8, &(0x7f00000000c0)=0x5) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x7, 0xc0, &(0x7f0000000080)=0x1) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x5, 0x101, &(0x7f0000000000)=0x1) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x7, 0x3, &(0x7f0000000180)) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x9, 0x800, &(0x7f0000000100)) fallocate(r0, 0x5c, 0x0, 0x2) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x46, 0xd38, &(0x7f0000000140)=0x1) 04:04:24 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0xaf070000) 04:04:24 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xd, r0, 0x0, 0x0) 04:04:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc04a, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x9, 0x4) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f00000001c0)=0x1a, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) write(r1, &(0x7f0000000540)="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", 0x200) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x84000, 0x45) fcntl$setstatus(r1, 0x4, 0x44000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) sendfile(r1, r5, 0x0, 0xfdef) 04:04:24 executing program 2: r0 = dup(0xffffffffffffffff) r1 = syz_mount_image$nfs(&(0x7f0000000300), &(0x7f00000003c0)='./file0\x00', 0x7d2c, 0x4, &(0x7f0000000700)=[{&(0x7f0000000400)="df20b7c02a425658d0040eb33d98a5caf13503c29c4a", 0x16, 0x6a}, {&(0x7f0000000440)="71fc08b001f8c4741bf70439b85bb2f94c0b93dd0b58a3659d528aff6a8921d53ef8bb24e027bebb0e75ce3f9eb9d4def10fbb98eddb27b80c8013b79cde0129af307650ad891589ffbdb8394a5e2ff346f44685cde5ac2d9d9881e6bfe37418d0d75e74660daf1d3aef30745d0725c7be2a12fa9963f7c597f8c9275812dc54675096f550ffd976464728f3b35b08673e1992c37ac83d4afea4f790d7f3771071fd56e644319b197c8b3d14d3265d", 0xaf, 0x80000001}, {&(0x7f0000000500)="89a27eefee23047a108ff9cf72055a47ad61ac1ea5df9f8b2d887bfa6629ab23596597124363c2ca8d97c8edfc0b03553df18c12911ea2ff6809c771cac844130da114da4b56f5cbd28a6e13170b82085fa55f4913c70f01e2593d56430c8b6daf224ddc627a973e3077407e9a6897479d0f9cfa2a4591050b66b514520ac1203e8c577926df4e96d25129338fe226df60787a5fb7c3d5a0c9283732fea422778528ac358a5a917591e9fb6eb9af56dabacf3fbcfc29fc264226cdf54031555fa6056062c5517a4ff2d6c31654d8e1947efdf752aefd80af5715ac866cb412b9b51a6dbdcbe8840d33ac59e0f6c50c3d30510e1a14", 0xf5, 0x7}, {&(0x7f0000000600)="f6f6e432a3bb10a02f400b928c724da4eae2aae18ae9395b6d4cf6a10a8a96361e00f314818c13ca0e24746618e95359ba530b595a6fafbe9de907963b366b37ebde7d81acecb4f85ba2e5db2b1d1286f87443ad368e4f6823f26d77ec18fbe78709ab3b3045da2c0eb587c12e7f82614114c79cbc7eab5f09c9d71dceb4a8b2ff8399a9deacd7c2ce5975a8e52b1d753e95601af0439a0ab6bf8519880755ebd0d98a2018a74141776072469cd2d8382bc2183e6e896165903c54dd8124c606c75c14f32d44cfaa461eff3b1ffe4aae1dfeed63d57544ff1b992f6b5fad6eb0f27c90ed1491b49430af2630e0ce665910813d12776d53", 0xf7, 0x7fffffff}], 0x800080, &(0x7f0000000780)=ANY=[@ANYBLOB="759e5f9b", @ANYRESDEC=0xee00, @ANYBLOB=',euid<', @ANYRESDEC, @ANYBLOB=',uid=', @ANYRESDEC, @ANYBLOB=',euid<', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000082c0), 0x125b00, 0x0) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) finit_module(r3, 0x0, 0x6) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000008340)={0x8001, 0x0, &(0x7f0000008300)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x7) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000008c0)={&(0x7f0000000200), 0xc, &(0x7f0000000880)={&(0x7f0000000240)={0x14, 0x4, 0x1, 0x5, 0x0, 0x0, {0x5, 0x0, 0x5}, [""]}, 0x14}}, 0x40040) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000800)={0x5c, r5, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'caif0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc0}, 0x44030) 04:04:24 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xe, r0, 0x0, 0x0) 04:04:24 executing program 5: syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x1a8, &(0x7f0000000400)={[{0xe9, 0x4e00, "2253197e03366ffe540e70ad98a93dffdbc56f558298e994f6b019e37b3ea719b8772592d52449308fcff67d603ce16b31fac24234bae05c8fe1db7dca43d64d58e907238575bd4d92559efc95b687f75a89b7d6d0dc92e47fc6c12dffbc11251d9183943e285b52b460bb2279e92c3ae31e71a957133f4809a2caa5dba15db35da87de3806721a8f54bf51333ee282b91e64eac7893285c33e638d50cb1eb04b7912967c1f2969a16fc87a400a2f421d7ec81cf582dac35055a3370d27ad6b0ebe1330f33a644727b5c028b17001a4df955e3c1b05122c2f3dd53fd52d2889fc540141cd38a7ad1d6"}, {0xb2, 0x4e00, "07a3e5c59d6ffb74e9a39390b5854aaafd502f1c3719765028c5e94c283eb08d109a8e06cabfaa3b39a5a4110c31f69604985d331d746bdd7fbe96bc5413a0f04baa1e0925b1742a1c7be38fab964ab4a47628bc56059705ee3752e6e64e4c35c17d4b2a852e646b4232cbb07be63959ad14a118f031ba257c661481403d95411623a8c9c2f98ae0b40e79e90fb6b26f378962753695a27a936449fd15ffc8f5e64adb02139866e775887b64fe0f123c5f35"}]}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d0f4655fd1f4655fd1f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)) 04:04:24 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xf, r0, 0x0, 0x0) 04:04:24 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x8, r0, 0x0, 0x0) 04:04:24 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x14, r0, 0x0, 0x0) 04:04:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201", 0x63, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:24 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0xffffe000) 04:04:24 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x1f04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x4f}) 04:04:24 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x10, r0, 0x0, 0x0) 04:04:24 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x11, r0, 0x0, 0x0) 04:04:24 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x9, r0, 0x0, 0x0) 04:04:24 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x15, r0, 0x0, 0x0) 04:04:24 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000040)={0x6, 'bond_slave_1\x00', {0x1}, 0xf0b2}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) ioctl$BTRFS_IOC_RESIZE(r2, 0x50009403, &(0x7f0000000200)={{r1}, {@void, @actul_num={@void, 0x40}}}) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) finit_module(r4, 0x0, 0x3) [ 712.808148] Invalid ELF header len 9 04:04:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201", 0x63, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:35 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x15, r0, 0x0, 0x0) 04:04:35 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x18, r0, 0x0, 0x0) 04:04:35 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xa, r0, 0x0, 0x0) 04:04:35 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0xc5d64dc7e23ff6f6, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3948f967b7e94c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40da8, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r2 = memfd_create(&(0x7f0000000740)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(\xbc\'\x15C\xe7\xbb\xd3\x83\xd4\x9b\xd1\xc8t_X\xf0\xcb\xba_\xc2qgk\xcbW\xe7\x89\xb9\xb4\x06s\xa1B\x96\b\x17\x11\xba\x02\x00/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa{kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xed\x01[\x17\x004[\x12o\xf0\xad\xfa\xa8\x81\xdd\xbe\xba\x15qP\xfc@\x1a\xea\x92|\x04W\xd6-\x9b2S`[oUAY\xa8p\xc5H\xbe\xc4\x95\xaf\x04\x00\x00\x8e@\x00\x00\x00\x00\x00\x00\x00d\xe4\x92\x01\xc2\xfc\xdd\xd8\xb8\xb0\xdf\xfd\xd2\x19\xef\x93\xf0\x0e\x98{\x9f\f\xd3\xc3\x8b\xa8}\x157\x9c6\xe5\x05\xe5\t\xb8\x00\x8a\xdfq\xd1\xdaa\x82<\xaf\xe4\x7f\xbb\x1b\xe4\xd9\x12\xba\"\x164\xe6}8\xcf1\xd0\xec\xbc\x9c\xd6\xd0\x02\\,\x9bt\xe3\xa2\x95\x018\x9e\r\xf2\x1a3\xb5\x95\x05\xe5\xdd\n\xb4\xa7\xd1\x05\xdd]r\xc5;\x97\xa4\xa7\xd27\xce\xb9\x18\x90\xf2\'1Nz\x8c\xf38f\x8b\x96\x00\xca\xc0u\x80L#T\x13\x8bb\xf7A\xcb\xe0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\xc8!\x10i\xc3b\xd9\x12\x0e8\xb4b\xb7\x94B\xd3x\xd5\xa6\xe7\xa2\x9be\xf3!\xfd\xcd\x82\x03\x8exT&6\xcd\x86u\x05\xa0\x83\xeba\xd8C\xee\xd5\x04\xc3\xbc\xd5\x8f\xde\xc9\xa3vN\x8dn\xee5>\xf2rfIg\x95\x1d\x05\x0f\xe2\x13\xe3\x04\xbd', 0x6) ftruncate(r2, 0x9) dup3(r2, r0, 0x0) finit_module(r2, 0x0, 0x6) ftruncate(r2, 0x9) finit_module(r1, 0x0, 0x6) 04:04:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc04a, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x9, 0x4) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f00000001c0)=0x1a, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) write(r1, &(0x7f0000000540)="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", 0x200) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x84000, 0x45) fcntl$setstatus(r1, 0x4, 0x44000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) sendfile(r1, r5, 0x0, 0xfdef) 04:04:35 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x12, r0, 0x0, 0x0) 04:04:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x7ffffffffffff) 04:04:35 executing program 5: getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x8, 0x80, 0x1ff, 0x4, 0xa, "04a1bbe98f06eb37"}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_loaded', 0x711400, 0x2) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)="2896a02fa93bee17b86edb73680011d6fe22415cb0f1d60d2c2ee2b160f25de8b0cdcb77253abaeed331bfc577e42034d124a5a20beda7ae8f621c0e5f399a0838900dcbf2fd405dc137dcaddda84539958f3af4f206da84e69b35", 0x5b}], 0x1) ioctl$VT_ACTIVATE(r0, 0x4b33, 0xf0ff1f00000000) 04:04:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) r1 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0), 0x4) 04:04:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c2010012", 0x65, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:36 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x13, r0, 0x0, 0x0) 04:04:36 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x8000000000000) 04:04:36 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x280000, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xac, 0x0, 0x9, 0x201, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFCTH_TUPLE={0x84, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @remote}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x32}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @empty}}}]}, @NFCTH_STATUS={0x8}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x5}}]}, 0xac}, 0x1, 0x0, 0x0, 0x408c6}, 0x0) 04:04:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c2010012", 0x65, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) [ 724.028519] Invalid ELF header len 9 04:04:45 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xb, r0, 0x0, 0x0) 04:04:45 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x9) finit_module(0xffffffffffffffff, 0x0, 0x6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000200)=r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x3, 0x1, 0x9b, 0x7, 0x0, 0xfffffffffffffffb, 0x20, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x1, 0x6}, 0x10400, 0x53fa, 0x7f, 0x3, 0x3, 0x3ff, 0x20, 0x0, 0x3}, r2, 0x4, r0, 0x0) 04:04:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = accept4$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=0x6e, 0x100800) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000140)={0x2, 'vlan0\x00', {0x2}, 0xc146}) sendmmsg$inet(r0, &(0x7f0000000180)=[{{&(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10, 0x0}}, {{&(0x7f0000000240)={0x2, 0x4e24, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @remote}}}], 0x20}}], 0x2, 0x0) 04:04:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c2010012", 0x65, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:45 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x19, r0, 0x0, 0x0) 04:04:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0xe0ffff00000000) 04:04:45 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x14, r0, 0x0, 0x0) 04:04:45 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) signalfd(r0, &(0x7f0000000040)={[0xdb]}, 0x8) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:userio_device_t:s0\x00', 0x25) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001a00), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001a00), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r3) sendmsg$NL802154_CMD_SET_CCA_MODE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001a00), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="010000000000000000000d00000008000300", @ANYRES32=0x0, @ANYBLOB="87bb96"], 0x1c}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r5) [ 733.680793] audit: type=1400 audit(1765512285.851:31): avc: denied { create } for pid=7042 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:userio_device_t:s0 tclass=netlink_generic_socket permissive=1 [ 733.688130] audit: type=1400 audit(1765512285.857:32): avc: denied { write } for pid=7042 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:userio_device_t:s0 tclass=netlink_generic_socket permissive=1 [ 733.697140] audit: type=1400 audit(1765512285.858:33): avc: denied { read } for pid=7042 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:userio_device_t:s0 tclass=netlink_generic_socket permissive=1 04:04:45 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x15, r0, 0x0, 0x0) [ 733.721283] Invalid ELF header len 9 04:04:45 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x8000) finit_module(r0, 0x0, 0x6) 04:04:45 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xc, r0, 0x0, 0x0) 04:04:54 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1b, r0, 0x0, 0x0) 04:04:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000008000000018000000c2", 0x61, 0x400}, {&(0x7f0000010100)="000000000000000000000000b8c5c4d1b3cf4b38ab2e2967fb770ff3", 0x1c, 0x4e3}], 0x0, &(0x7f0000012f00)) 04:04:54 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x100000000000000) 04:04:54 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000000)=""/45, 0x2d, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r2 = fcntl$getown(r1, 0x9) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/module/netfs', 0x80000, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xc, 0x0, 0x15, 0x4d, 0x0, 0x1ff, 0x44400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x17384bd9, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x40, 0x5, 0x0, 0x7, 0x7, 0xfbc, 0xd21b, 0x0, 0xfffff001, 0x0, 0x6}, r2, 0xe, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x4, 0x1f, 0x6, 0xf9, 0x0, 0x40, 0x800, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x81, 0x4dfc9802}, 0x814, 0x10001, 0x5d, 0x1, 0x0, 0x3, 0x1, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x9) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) finit_module(r1, 0x0, 0x6) 04:04:54 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xd, r0, 0x0, 0x0) 04:04:54 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) close_range(r1, r2, 0x2) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_open_procfs(0x0, 0x0) pidfd_getfd(r3, r3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 04:04:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:54 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x18, r0, 0x0, 0x0) [ 742.645380] Invalid ELF header len 9 04:04:54 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xe, r0, 0x0, 0x0) 04:04:54 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x19, r0, 0x0, 0x0) 04:04:54 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x200000000000000) 04:04:54 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1c, r0, 0x0, 0x0) [ 742.760851] Invalid ELF header len 9 [ 742.770943] Invalid ELF header len 9 04:04:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:04:54 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0xf, r0, 0x0, 0x0) 04:04:54 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0xee000a5e) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4000800) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 04:05:05 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x10, r0, 0x0, 0x0) 04:05:05 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x8, 0x8, 0x0, 0x2, 0x0, 0xfffffffeffffffff, 0x310, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000000), 0x7}, 0x7cb, 0x200, 0xfffffff8, 0xb, 0x9, 0x1f, 0x2, 0x0, 0x9b91, 0x0, 0x4}, r1, 0x8, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) 04:05:05 executing program 3: r0 = fork() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r0, 0x12) fork() r1 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x800, 0x4, &(0x7f0000000280)=[{&(0x7f00000000c0)="8456ada90377f382a4953dc5d69e2f0adece4ddb5e702908620bc9af7e2e3669ad4f67da51e46733b5d2628634609c5cb4b1f90d1562a11210173e5cc0d908c243fca785", 0x44, 0x81}, {&(0x7f0000000140)="ed959bcc2bdba1556dcf0370730ac9f8dc22b1fa1f24e5a7ef6e0bba0c0a31ed265d24713e844cc9e202d48b9d59ddec9cab8c", 0x33, 0x10001}, {&(0x7f0000000180)="5a3becd4601625d54e094d5a3a6eb39848c7867f61aae381b213e6de0319a271bebbeba858347e28c9477633d63d85aa27547588a2bd2cec3ae8d690502788a2235d02", 0x43, 0x200}, {&(0x7f0000000200)="93e27bde6cce939b831bdd2694633a0c92184e26271b5427a6e9bed28092696b94f0fc751c2659bd2fa864076be6828eb76cab8041a89c276c743f40b1ba2d8164e408b1f043985bafb49e3522a3dff03a75bd4657fd758e4c3defe576b12e28a008b6671cb4f1b2cd7eb6c087a32725682cf9c9c67da57130ad30f0f5", 0x7d, 0x100}], 0x4018, &(0x7f0000000300)={[{'\x89'}, {'\\'}, {')$%,!-*(,\v('}, {}, {'{/\'(+/&'}, {',(K*])'}, {'][])\\.'}, {'^.&]'}], [{@fsname}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fowner_lt}, {@subj_role}, {@permit_directio}, {@permit_directio}, {@permit_directio}]}) fallocate(r1, 0xc, 0x6, 0x8) r2 = signalfd(r1, &(0x7f00000003c0)={[0x100000001]}, 0x8) pwrite64(r2, &(0x7f0000000400)="452cd0efd030530cb092e11e84018473873e34e4239775334264f9fb8fa7449084ee5551a01d2d740723024846f10186f5a9f1d83c445e8d7532879e9f2c4dae0fa02e39d292b4d4c08b3c15d9a7207f1b2ed0d5c3c9f7577536767e3346075a25f32547118748698d5e150545debeb97b947a3d24afc160343c380ad7dea99e300ebd0a0c234789f79a18270b545d356665fa872f81c004974d46", 0x9b, 0xffffffffffffffff) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) close(r3) move_mount(r1, &(0x7f00000004c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r5 = dup2(r1, r3) move_mount(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', r5, &(0x7f00000005c0)='./file0\x00', 0x3a) setxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.overlay.impure\x00', &(0x7f0000000680)=']::\x00', 0x4, 0x1) write$binfmt_script(r2, &(0x7f00000006c0)={'#! ', './file0', [{0x20, 'func'}, {0x20, '\')-'}, {0x20, '@'}], 0xa, "b1d2ccb5e341cb209031b7c19071d12e416872f6aedff4c9e1953c6185cd4a511534465aac27ad5be710118c10d938c354c61f4de5b82d6b47ebb3455af7e295e06f91243261e0926ba5372c1b791fb1d8f4f6be9861d6626728fa7378454f508c492c"}, 0x79) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000740)='./binderfs/custom0\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f0000000780)={{r6}, "5711b199db4f14b2b0cca548826f61de4dad504c2e16388cc2fb9de776450feedb7ee3ff0b1437f4ff04b603dfbbe6d5710e3673bfb3c8a40f85aaefc9ea974a7e0329d92a87f148d8d6c8448b610b8d16c659168d931d2915737c3a04fc85e76bc74722a6fc2629df9cc4d1ed8757c86b871a32612400cd1aff178f4d9bed4592e44a385470b24a2e0bef9a29aa7ebde276c4357e192e28bdc1b7b4bdbbd65e87b161a1253af1fa531433e1783d69d37145a965bf85589940553ccff2eb6bfe66deb0f766385cea22962caa2ef23c94a51d963c412255a118c2d18e2d417b456565ed0cd385998033d37109f6e28256ca483b0e46a7027fa32dd881db44081b1875ac0f1240f73ed18d7d2e57b9217a489435615b3c8351ebbaa483f221a06f9c57ba7394b70dd3a4e907f244acac74e862ad64bf10ac843ab0faa7ee8005f70b53196fa8162fc92c4b6ce6513442e00c2f8706f5a0d46c9c15c994ad9ac359ee090114812c09afc70d835d556c5b9e4287f1760774701a97e84941609a208bb2d04c766cbd7ceb058a617d6973c14a7ded441198bbb004fa6cdee09bb009f631ef7b07975841de1c16cc08ba92d3faf72635cc559324c821986ec47515ff1739c27ff4a31d776d7dccba370a26786509e28a0d443c106a790c6200539c24b17f3f93faed13ee0b855a8ef11e5ff93dd6d7371c4d3cf88f2e13c83beb8b1ee3dc98928d247bee5c2ccadb3469eb55942bf2ae6f64d86045248abbe875426c66d53f76ca41cacea8834d9b36ef9858cc8a16776c4c89aecc6b06bf69596ca61fec2eb1fef1093c5b2a7683e38916743492931ef0da88d2b6017be46b8b370299f2bdc963560a538439415e4c040f7911073e552f2abab8cbaa64f4faa3645a361c2586fd8a3e69701f4deb28fd47709199e8430b2a35628c71b07a2b6801be3f4ea6c66e998a0388dbc2b16941a63d1fbc8a06089bb58257529950d00440793ec13e48dbc97bbd0465e6695b4bcdde6a9f53f5e018a3eb916c955c07d2f86c0a49541bde7ef7863f7668a68babd25a0628437511141b3caccd3c0f4cadf5be81ee37795c573f374ca461f44178545f902986fd52127d142fb26899cd1fd4eabb73dbe914a8c0c382dc5034e9dbb1d711846c7cb7ed976ce76a54dbc9786adebe3178224af2e509e1a0dd0fb64bdcc37167273df8a5f388df8803f75f2791328caa3fa23031d2c7a3447eaa3b25adb24b2e271e259fd95b3f3fddc5516ea47e1569c2b2eae7388d5cb5b15639a64fd84398ca8a460d36c3a42019f4daa9033e7be5b358ec2259fe8ed8dd96cc60aae2ca6fd5adbc0e6df7a09ea4575f0405002b28bd9f8734a4644965d5f7a53c60debbc5b3b45050399654ecaf28caf66b59903aebca619e958ff01cce13c67b9443e9f78d65b49a2efc80ab5449413cb4c88cf5a44b0c6a56fa59c29944c9df80efb5a72304cff07c0858e512266a57776c9853a87aa0708aea92fb6da0a4f49839f49efde92e50b92b3c8e3e508786ff635751176669cbdca3f242f946fa2972a7b59669947087ea7538f46919fa426abfa009fab462739350b5aa6437604a7d265e7e58af06099217eb2dff671f7e9114878ba4f25ff06e81df8cda14b4e9c671092ce02efe739605f963751bb0a64d6ec4724ac87b504a91ee1aa4fd7ef01d37d10e03a43275f510ff0abc4922046344d487383803c662f230e2fcf15b6e7d16086a7eedca41ed700fae5acf9a0a9796fbe14cb03f8fb9a9b5a1d8d7251166fdf3787df7f597012101a097f97bc739d3918fbefbfe3e9eb7d7435cbe8be879d48517fbace6c2edae4cf21369490958bfb1f4f0ffcd4bad806e3f4f6e723735e20bec488993445b1b57275874729c60a28348badc6725d7f8a1a535c9fc5ae1058c9ac6297b850788702e5145f3efe7f396ed0fc5ebafbe37199ae9aa914fa1fbe926064cc7df88c3031e4432573535389a3a686d57c7cc14f33b62e942d155a398f3075cdff75c55ec3368a48d1fc885a2814e2b20e47c77a5d7722b668c6abed6ecaf426e6fd92a1af11203251022a9e211b133d5043c99547eb4f86ecfb6ae72fca65ed8dc22a1320ea74d5fffed937fca1d68d402cf4a25c1049376eae2db2fc56b93be76525dcacf96b2802950e2e2a6d16a1a4f958ff9de37635a26aa0342673c7b0a6c353e557c9abbc290e9a5fc43b683e18b27361322e9b9a5aae8148564a9415007e1016c1d671a64de90c61cf6b6a92828d44c38253b1eef07df499a10ae6e76962258a3f6ee7606b1236dfb30e5d394d180614a09731a2573df9c9bbaf2deb568b8171c2cc0530209bb3a4e92a1a6bd51c91bbf70bee826ef6e29d7982396be10f208a3318ce96f4235acf4b05a7127bc9a4e97e57a63cdffc67e1b0c16bfb20a59b56c0ef06d6dd14c0ac8d0a111b602c08ed57f28724ea23680283bc0b83c681c28c654e6d37600e33e3917ef064e465e012d0c235c372671f6bf5ff81cdc6a07c9ad9adcb53ac358a74d798ee7e3090740786ecc15a29d6022f1e54a03df0f5f9599b6285968bd6b7f8b7ba040416d5f6620516df52940a6f1107b3080c4cefb36e56df283c33d40e3f6d115e8d009b197a344f48d2ccadb833f9aeeab40294ad5eccf1fb6e629da71d9590cadad144df99cffb4795f7f85a884f7ddcc95817fcd545e73bd247e3390908cb9bf2a62e826566c9a328b38ebc626961b34eb186d204317e431848792f17191748abc950893add8fb89445148c147bbd9d5f72f440a7de82b6d53b4f35d6b2ad1026f7042734f56b982bc0fcc3530ce1d68f03fc5c3ac19b17fa883dbd1ba91a8177f087c0f63283d28a5cca37c314074cffdab9c4a3596b0b17bffab14780e8b180058e2ada020c64341a4822f93fcbcfc57bc3322328a72f125c5474333a21820081ba8b4134eaf97291f6bde7b31d9791c630e9175c89ecdf516d326bb2de40583941821f7ea01686ea6186fa96265d35e23677b663af675b67cadbd29100408fad6b944b4233379dd902d1dd816d4171ae253a27636bb7709492582ec3a7abe57bcb893ef3d1718670c93b8f539cd09c70b645443be86fe101bfe08bddc40445dbf64a6467e36d43864d02c022000eb20deeeac8a9b4f013a67bf43f22d8e6ea777918f14f00351e032508e175d09866a27875f9f0fa9bb8c77491bc7d175dabab95a84336b02d76f17acb269de27672871112041f012ad6bda79982c8cb29c8b98f93330aff97db1417ec6208fcd3d235a0e4fbb918d34148dae4aff350e72fe174a09a15afdc0935b46707ef45b558824446f08f92226970d5da4f56b3727c07b653c9e9924d5f3660d9386b449c0708a5ec5bcd39f3b2cc74d66e9384a48dd6664e0ea324f9913179f9ea27414e4185a6c53fadc7d9c374810b89979561584794974f4e42ce4b7b03a35fe1dbb3f8c53f39d01e2c1da56a7f0898a0b229e1378a20799384bb2c9eb9f3da3ab88816ea894517665351cfd13d5aa850fcdad006ed88aac3e15af81c00f433bcff924ef2744e5ed87ad27cf13c3e01bd01d33e9524edecb394235f3773d70b1e30660f327da9d9b189d875e01081e44dd68e4fc3105bef83c7a57feb39bc0530661a9cbcfa3771c5c1c4c32a49fe9f1f1913cae65cd5da674144943e1c3df181d9dfeb1c4daf72253daa5436e2d0001270cda5e0534a8984622c7f23a898fe5693a35d35cc69bd24f4a9fd59f7a86a111cc49195338ffe58317e1e0aef6e162a535a1051189966a5c24745e5a5ad341bb941c00c00f7fa1aa73a7bba2268cea73f27379920abe3c93b122fb8bd6f662e2223ed3a575ea87024a2f816f179aebefdf80c17bf4084190ae012f76a9c94da8b3825727ec4875aadf12ad2a30aec15926e78f53114ec067b51ef8a643fc7eb58e51e1a8ba342204a0153462ccb91ae8dae43f4da7929c51385350f180fa4df127642058cd201bd1ecd6eb2f2d0b3e44c989c2ebdd8f5a483eb4bebdf78eeee27509205d5eb7681fadfd7e8233b647fb78fb6436c46d6d5030a0c18dfc8ab18ef757b80b480d63252a49bcf02196df298e344c6f257598abf38ea16bd3b61b9805c5cdcd8ff74acbccfbe153669b156f4ef0a427a3f39073b72c6f8ef8f616701734b9501a2bf0671db7d0a5cbd9c79d111c4144301779c3d00bb419471bf7229ab2efdfcea8586169a589091e5caaaba393c9326b32be273e76f6ced501d23638bce7255bde3b9129c119cf154b3d618cccdcc37ae725f246165abde3ca27186faa60d9c80532ed4c6dce33db41193af51ba4d545bb16e4dff6bc25eb56c43c87ed5de15540cae704013ef02f23a6d573960cb4a9438650eeeae9c1dab31a0cf1c9f79b7589ce6ff7bf75ce01325de707653065424b3e16467c1142634e86652f624eb21490a7b0852318fffeae6eb7eeeb7f92a8e42600ac894bc50f6574470d8b66522e1eb21202f2413d2c26bd7d41d1947044ab536717ff9f803d588ca6acfd5572854968a5bdfb0d326d1013b46fc9f893483d7ecb0d6026fda5cc01d3776f2275ecc95e9c8ac2463ea82c8531576e0eb57aa1f7a2003f44048fc06d77f5bce7013151b5d5081e24ecb038a607d73dcd70bcc63a5f05881c73a25707d17e8c8ceb431c91999a02b98049ce3d1a8be93d6b980499e31048f8a5293d243c78c9c019bfcdbd60146066d4bfd745a3bd496951ea96d079e93378e7b97dcc5a57cabdf8fd1eed66639b151a709b0d40f4811d09e936f1848ef066b8ca80e8eb38e90dea996550df2b7bdfddfb7e3761496eaff644b1e2df03d51598f94ba0961b0f434cb2c4b612d798b978d04ea93dd1d07643e28867f0c7c0b039cb1a083386622ff327accb01659681d336855405a210331adff29999457e890abd1e9e0b0b27d540a1ab62a915c951479385f68f08c4de47eb8474512a2c2e19f5c4c48bf7253b9eacc56cc49ee293ab9fa52fbc679ae48bf5c1c46d0177ac1ce3c6a8be3b908de79bad2d5717d52de74d6af418eebfd0bd03bddf61a44f1c009c41f0d8cd7ac80c14f065028999511601d4e9c7cf41fb2b4b7ef5fcd70a2f3bd5920d7d5fa46fc42f2527fa3a02038d33f6de5826348e38df2311347cbd59f9e498b37ceb545ae50e1b233df15d2341fae3badd06ddbe53a5af4a30d6e8a0ca34bfbabe4fa75004360f99e6e141c644bca020132c27c3ec903815a4fdc059932ceb5a9a07c96bebcdb0f85fb03d8fb16c28021098b6c7713f66c2117e77d9e521bdea8367f1c247ab87a21ebd5d7d87b82bd68df68bb97d24c7ac0e32608f60ac08cc041b6e160d669d9777436c695a3fb341065d8b957f4a002d84c33e63d0032c4cdcb9bd0c69d45d6781690faa1a2df67b18873424d52519783bb83dd3d3b44e3e6c871035bc8662596a24eb8dc42c22734746db3043ad0b936641ce9ee1d66f4bdf84b7432c7d0053fd1afcf7e0737c99e5bb2d152b8a6a852d835676a6e53bc85de5b320d25471bcac36363da3c722b23f6529c0f3eaa7ff3385e9024c7f1f1f32a6c7f67d2163105e913cbc5fa17a637807b8f83b9b0788821a59297fc188fa78dee920c10b7d9e783f12dbc92f392c4e1b25d25522bf34864f16f6593155143bf9a5a161d79046ed8c5d54d463581e34f216e707f98d67a5f4d2f677d258c2f19c3ad76c42dbda83a6ebd960af56459ed592b2f896cd8d5f38f3a5347548e6c8688c7fbd2c1502921b451199555831efececd8ec5c6ef7"}) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000001780)=""/128) ioctl$BTRFS_IOC_QGROUP_LIMIT(r3, 0x8030942b, &(0x7f0000001800)={0x6, {0x34, 0x9, 0xd4d5, 0x200, 0x80}}) pidfd_getfd(r5, r4, 0x0) 04:05:05 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x300000000000000) 04:05:05 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000280), 0x10002, 0x0) ppoll(&(0x7f00000002c0)=[{r1, 0x10}, {r2, 0x9480}, {r3, 0x5225}, {r0, 0xa490}, {r0, 0x30}], 0x5, &(0x7f0000000300), &(0x7f0000000340)={[0x91ad]}, 0x8) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000ec0), 0x4) ioctl$CDROMREADRAW(r3, 0x5314, &(0x7f0000000380)={0x7f, 0xf7, 0xf9, 0x8, 0x3}) [ 753.726187] Invalid ELF header len 9 perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xdd, 0x1, 0x8, 0x1, 0x0, 0x8001, 0x4, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x6, @perf_bp={&(0x7f00000000c0), 0xe}, 0x80, 0x10000, 0x10, 0x8, 0xf8, 0x10001, 0x3f, 0x0, 0x6, 0x0, 0x99}, 0x0, 0xa, r0, 0x1) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) writev(r1, &(0x7f0000000e80)=[{&(0x7f0000000e00)="3c306345a8c094311f10142ba7493945e7b45d7160d07d3d204c7c2c1aa9ce75facea1c44cde86636a7d0560f4871ebfd8249613a6da8f1c23b6414d4bf18352c23579659161f0bde32922a9ff92f6", 0x4f}], 0x1) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000f40)='/proc/cgroups\x00', 0x0, 0x0) ioctl$CDROMMULTISESSION(r5, 0x5310, &(0x7f0000000f80)={@msf={0x3f, 0xe6, 0xc0}, 0x0, 0x1}) ftruncate(0xffffffffffffffff, 0x9) finit_module(0xffffffffffffffff, 0x0, 0x6) ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f00000010c0)={0x1, &(0x7f0000001080)=[{0x8, 0xb7, &(0x7f0000000fc0)="36f2e4b3643d021128817736d73e776b06a02bc8ee32afef49f58b283875430438853ed5c2aa4d55fd67a9f459b0e3aeb4ebe789b932a483e3a0b92391a4c773c6c3a0e4e691a38423051b4d01848683c32c6f18ff588b5a50414b01f96ed62f3fe7cf88f1286032d59f2df8628b80522b25d8c0447ed63b704025bc1c56e4e29a4077ab516c52181e371e32e816fe75b5b122465d0db8c37566c455778b3980d2cc848a6b3853381e76d3775f510ea8e850a76af766f1", 0x1}]}) bind$802154_raw(r4, &(0x7f0000000080)={0x24, @short}, 0x14) ioctl$sock_SIOCADDDLCI(r4, 0x8980, &(0x7f0000000f00)={'macvlan1\x00', 0x1}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000180)) 04:05:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) 04:05:05 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1b, r0, 0x0, 0x0) 04:05:05 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1d, r0, 0x0, 0x0) 04:05:05 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x400000000000000) 04:05:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, 0x0) 04:05:05 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x11, r0, 0x0, 0x0) 04:05:05 executing program 5: sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xd0, 0x0, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x200088d0}, 0x24000800) r0 = syz_io_uring_complete(0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x4, 0x20, 0x38, 0xffffffff, 0x4c, @mcast2, @empty, 0x10, 0x7800, 0x7, 0x1}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000300)={@local, @initdev, 0x0}, &(0x7f0000000340)=0xc) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xfc, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000500)={r1, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}}, 0x10) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000540), 0x482800, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000005c0), r0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000001780)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001740)={&(0x7f0000000600)={0x1114, r5, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x74, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x67, 0x4, "e2f2eba035e4ac3478ade4faddb7e7265ede2b05e69a85e35340fb8c5e1f9e207408d129448ee7184acd8b0f0a382421c64a15cdb1cd9a9a36dce2c93ed2ad2e14f5a7347365e4886bdc7d0bafe5f386e743181879b7aeaa91499fa083d52b9d8392a5"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}]}, @ETHTOOL_A_FEATURES_WANTED={0x1008, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "ff32bfb6501b5cd4cd7d86dd93db149b0778322cdfba390f7bbd5ca585fbcc8ef70c32114aee2af086dda80da9abdd42bef59b5ec4c405726121e885a928cc1e80c228851ec17cd0c402d7cfdcae24f8879d5116b5b58556fbbd9ab41e92e2a8ab2d4dd1f2603063e35c4fe35b55740dda76d6a1249edc4a8349ba9359b347d46c1aac27438e8beea4348bc047da3c2d88e2fad76ad3d5078f9b24a391cd1243fb2b4b22f8d3f3abb9c8567a73285b43e3457e6b3d5231213ef38daafe4751aa9b32d03da84b7a3b7c61e0dfc84aa97d2961d842a4bf97453303496b9eeb986773bde8748d5ed9955aeba4e0c1f506fa683654b169debff9bd8c4f81d7cfbae25fd121860db3078cc78f1b24a1f50c60aad9ab80b263575523bb657a6207353d82ba983123bfcd9f57cc53d7e0d623c76df69bf2060841089e338b161e28cb6da4c244ead6a6329c69cdfb7649dc0aa1731fe2a2271b4b62ce6f3a77f2af366641bb12af9aa12609461eb5e2eb91e0d7a6003bbbeabac4cbd533bff8a7108879abcf01166146ff1b0b358e6e9b8b5bd6214bd4052ffd9dff1e814625f3fc553c8534498fc1e0cee717484d57a3987fb7856268dfe4e17c5038aa429237ce86dc15e27113e44b05de9464fd48d6709453939a46c2cd85c418131b5f21baaea3da328fbf0598938372a815f5350bd4d0459bec6acc6f6b16c1bbb9cad0e6a78f8cddbc774f3dc8fe5e19319520aa1c5da1faaa9ead9517eb2bad8ed930f253c3a6fbe0b58e4af036058437b00dafd56d19c6ee97153cd3a4c1253f106bf05a8ed272ff3f3b928add6da621c531404980c716d20a1c80468f5052b9e9c58bbcb809d433d533be84f018e0554dce53064a3ede74e7f16ad3b1a2c7a3c33addb71fd7e3d91186a914ab4ba87e4169a38553476e462dc5db67b8603cf3ba379767a9dc9949d0f3c6abcd6201f65123d418f5dcdad64aff444636caa5b2fc6be986402ae5d3345b4014455fad878e9ee7abdb6052ec8395b2c09689284ef856fc1e44016e3fc289505973694d9fdca6fcf7dc2cbd2c6729d96d9b120dcdb986031d18cb70e70e639f6217cf8a12333df841ea73d15b28b4a26fe93d52a6dc9368fbc7f9d3cbe747f91052688c8e6ea17a9bd0ed07d4235a4de1366908cea34ff9483de1d7ae6225741668ffacca1fd160f654f709c6b0a91a52849bfaf5a29d00fa2be099375917cf87d257df6ddd8bbb971d62e380b4879715da13d445d0afd68844ccf976a60ab13773086f1a7aa310017f8ccd7fcb188fea1d497e349460916ef3f709b231046c0d03222e376a0414a1091dfb7becf80e120e9cd13c6e43d20b7e3798ed85e5a06a507de85a95e7fcc95de72a218e1e1504df1b936c8036ae7024862f5402e5dcb1dca1beb6bd93e158f4654d4244f186ee5892eb93c4cfa35134616007bb280aa755b35a5b255c1e82d59e2ed9c7f2451cb34f7acda46a0b7f1d0055436f0c00a74d7da24fefb303fd4f5b94198db5ccbd286684ecaf294f1e76027cc6dabceed154de7ffd03ae24c98dd9cd427ad1908ad823b8769a0578f08231b38116ee7219b19dcc8f164cba5e9c268a37e4ef2fbbb380e5b99ed0de7e3e1843990efe78cd1b5e4b85527f8543a20aba908ce2de55f999477f856afe9fd4f18c0dbb5ea26c58c46a4465d4a9113609ca13cfb14afb5d55db17fcf5c0ccabde50d0aeaa7cff2beef11e0ac14a1d495dab7fdfefb9520d1720ab94739f1ba141c03ba83733c04f8899d4d523bb01b792cd5d1add4c9412189579ee54fb8b348eaf1e360b9d535059883cb799e8992d0f37aa06006e4072fa6557c60ee35facbb71623407068a7c60d7086b8c16e7df70ecd9d922cd963176cc9aa6ebd148ffbe9a56a3de0e402775056092ab212c4a342fe3f0b32989e461ac388406cc3d95fec1dca61a33a8596235ebb493476363548ddb36b85d5b560344a8237f48815870f2727edeff81243f0e535a196bae6b45ed66f35ce0ae37232ceed54bc8c3247ab81db500f94655a5636750e5615296deb83cb6d6b1260752b90de266cfd5f2cf41232a9f381d523dc3b9a2b78ddd2e8e5e045845c057120033c1cee04a8ee943d3518a90272c5a7c319a4fa5741fa86fc18c543722510acebc2e346692aff9c045fe6186eb50b6404fff7d02f605a82f099c17441eabef2195f6808aa467d0c6fcbd90a76bbfbe5a55fa3fc3d84146d6dcff814a0be6a510cd573f1afc3a6d0fc4efbfb5d3a938f02c892e8743c6ae4d01df4829cc66d21209ca3035fd558daa3bea0cfa5b7f3c3fbdd195a388a2dbc3d788cfeb37e7f8d32fda56c0126563b898fce83760aad9f852345b277d97dcec8a80274a9b28e8a82cbe7caa37e2b1e80cc722e12d348db7212f9dfa15559cf2bd33ee468bd26a0e1cfe6dc9d5e484495fce2a29ef62c4d4e2d05a9cc46cfb7c072612595beb9d37f661898036cbf671276c03d013dbb55e8686415324ed99a4d3603468e620c6a2fbb6054d454910357c7debf6a47b1575122102de78c8b8c4d315afac8148a591584cf53ecea1e3f900b84694434a9ae040a0b8caa7eec47c45dcad49f978d6de06e96ddfdf7a8307128436b50a5b6e3ee4a37bfb1cb3cd3b6ddecd0b49e6c1cd691bdd291378545e6b37ebe67c1dc05b4ec16319ce2a65c55541ea7a3bcd79a29683e07903355d4c250b8fd675b447d0dc9b676ca7f2d65092711fb5ce9121a593f81f2d6f7d5677432d5e358bc29eed09be6a9dd68116e0ccfd7b4c6b129639f0a6366937aa535ece634e22eee434a0f9d192b52d39381125968687844665097d0550a31e1ddcedee850412db7f2bac8b517af52fa211e3d81bc8e37f4bffe14c5cd20916486752c188602eaf3bc62a094c9c67a0db27c87133539c1dabcdce82f588d2b36a98fae7feb5e8cad486694afb04821bfd3041fe58fe06eb564acda20e800358913198ced06cd47653f50879568fe2fe88e9449466bc590614292a6c190a0daa15741339cf65b85b002711cce71dd42fbca75dfa837c09926c3f5652ce4b07809ff06282e5e85639f928ce9cd546b9ba4a0b394ca7559bbc1bc414281cb563a715029b3f5127f35e06814e2fc18063f31eca57568c562b9c5dd5a7b839f467f3642b51cad8f8d6cba851530b864abf0c126d2be69d4e8509e7b8647b5091a41a91f1d00e0dcde6325e3eb83dd82ccd3afb0a666e15d0a03ac328576a07fbb1d7e08a1eaafbfdf6170c032011ea56e75eb33a2485b0cfeb001949e3297616724b242587979b5c42fee280b09fdd914d3faee79f20fa5810d3670c7ccad47c3b4d116f58ae012912e2a0b4d154e462a4f0f23604f8033953f53df5f1bf7ea3d42c0fbd66c17f5d60d41b8a3b4c6ff782d663d94729e97be70001927f5ec125ec7612b5a8164017bf532c4d7ff60b98f3f5451c363e2f2fe1ce10d82fb80ab425333d511dbe835c60f62b5aa9b7a318d11774506f7a0c5d71d920d3eb690ceb94dc477c368e4173d3485cb823691b52c39258298192b55233a4454ae8d6ebff4df4695f93367673c43951b795ffe2bc3997f1e184422dc39c785304d2b15d069c4a91724d94cc4b5b63d8b13116d5a5d233edc0561b26486809ad46f3c748548d92b2110988d4d2bdd035ba43b4bb2b44ab83354b1e1d23e18963ebfdb6ef80af6a1b9cd525240c3390fe1397cd45c9abdd5ff5477477e4a85ee182012d26ed79ed5844f88d5932e88fbc67ff3d5be643b054d72e9a151b7b0ca2e90c30d442aaed6f5dc146ded145bb876add7b634341e9a654b400154702169efaf08e770ef18427deeb07ab04a635c318518548ecb3ae1d82e6847adc62751f56c7c2c2b1c3e78c888a3edfc4b9710032a0d387e11a5084a576b90a4b054087b20af2b523d36283bbac677b0b8c2dcd14e6be1da4ba9700a3ab3b8c1230dffe65dfb1b546634e998c21d6692022a2faa2339331c1f9ba15e8c9daeaf8e7b83880696b0a3c99365f3e8b2f13fc13115b005179110760a000ddf8a6d659dba5899a3594456046d59d544459ec035640c81b29d6e3bcbbaa74820aebf5c447f7b9567e9fc9f6a08c687da043716efcb5610294eb830e4c2c287dcaa85c453202d99f907554ce3168d6dc6fcaf6581a5d8c5289eac2218259d40e7ebc9eefa5adc80335b1f79e915359ff02b52a2829a3cb6f4ed4f11cffe4bb2bd7ee40fefae32bb4d7d0291d19c26b834465e1dab07dff5ba237ba448826c1d3b174bac7c5bb04809161f973572d062cbcb7d0ca9e318d07a9158aa819187fbaf9dc965dda9d05fccdf17343d8f7e91d612e97ed095b3aa71d83ca875ed89f09062e34daf94276e60b407ec59d40374b760a4dbe4144715be985bdcdcef25fe0d1418147a1595b43d73d795ffcc9ff94146e1a9a932c5c1e9a17507ff737b72296711c887caa449acc86dc80074c1dc216d73750281fa9ea6c53449b2a8d4cbf98c68bda77aafb54c9dc4011a1fe3d31059e7b1a1668bc1c534ba19979b49d21fa8ceed8e17e498909786a728c9ef6aa33a2c9d180a4c15fd17a7aa37cf048a1737a9ad2860b25cc9d75c16a095728b3b83020288db64a2af233b66dce6d9a991d59815ce753670c8c777a6531f7848219904600824c26e1fbf4a53b5dfe81ba2dd1fed3e03d2c7d9620247c2d40f66ac1a5e13c929eb5578215dd26f1f57ad0a2dc0af96228b1016adf348d6eea602a47e5f2ed4cfa7516b99322981621e5ae05805653fec9f77c4d9fa9913052ad0b474d4c0e756e6d4101f5e133f7fc6caacfa0814b7a91923cd04f5db4ce91c3d9f800923e2b764c782dfe47d53a1c34e69d01d01f0960a013557690ddd189ccd7eeacc39febd2ab4dcedbe4a0b1a1dc35d8dcf857bf9f02f2b099abe76e1709e17ae7904418a999725fec35251d00200195296710c939fa40fe9b711b2fe46ee8e4e4e89788e80db9b820840e9631d5f35c1476532b6655db9f4701e7d5a449096414b29cb973a5f0f64f99fcbf0606023fb77febad4b505b93f392378eb7fd847057fa2876acad7a52873c2360e86cce5901a3db1fbd528d27ab33f7e85c79be3583b6bb77628454382424bdb42fbd119f02acb8a8507b0678b3077ac51c4da165d54af5858cd0a092d847c2a9af0ca7e8ddaa27ab7a6b3b327438ba2ae11aced9668e8aa6b438b0bf9ad6bc8c6d9ac9072cda8c81a25c58b9acc4e4157268aaf1eac011637bbc8a9913445fcf31699e1870f364f94615828a473be06ab136f0a4f3768b841bbe9c0a0118a31f26399f53976f0cef5d4366f83b6c3c723ac337d9cd7a8f307323679443369ba97ca406af6fbf5f41843dd796f832250dd463da92d72f8cbbe883a92741e07b9c73c6449552ec931a02fdaf6960c1259ab5b03aa50889ff906faa22d60e960e28d75871fe0b2a80339b784af013f2467b899b25ff792a31926ae845c0de18016483f69718b7df9e0ede6e11cbb38a56b438b2d7a1e5022f04cf3276fa1dee647847d67a7364a82b32b10a67c0b6557403a01acd4cc91a3dc561d2ed51109b2ab0a5b1bcaae360f1b258b6a390f42745a6ed98e1aff91a2786f6b816ebdb45da06fb206d2b473ebfda5bf8092942a574b17d3db0ec657f68d3668817776c7a32ddd65c0591253ef11c16588eec68b5e634e2ff319fe5d59b823cd671653f11a758a6206039a9ec84efd08679dd24210825765392b3720faa32ecd10bb37a99e4c6e90a3bb68a2eee2cbeda3443d2294f92a554412b"}]}]}, 0x1114}, 0x1, 0x0, 0x0, 0x4080}, 0x80c0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r6, {0x7fff}}, './file0\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r7, &(0x7f00000018c0)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x38, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xfff, 0x5c}}}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x40040) sendmsg$ETHTOOL_MSG_EEE_SET(r4, &(0x7f0000002000)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001fc0)={&(0x7f0000001940)={0x654, r5, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x80000000}, @ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_MODES_OURS={0x410, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x18, 0x5, "6c02a7d608f1476f5b53ee5b0395fcdaaf2f2d16"}, @ETHTOOL_A_BITSET_BITS={0x17c, 0x3, 0x0, 0x1, [{0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'sit0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '*+{//:\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '@\\$\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'macsec0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x03\x03\x03\x03\x03\x03'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x03\x03\x03\x03\x03\x03'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'sit0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2000}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffc}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '/%/][^\'^!$:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}]}, @ETHTOOL_A_BITSET_VALUE={0xd2, 0x4, "e3ba4eba1ee96bea719e9f2c1a93d86c47f2b811628527aade519b68224f18cbc2ee96070cbd6fe284a23673441e14a07e78097a4ea0b302b91bed42785eb15a6093e3d06a7bafc577d3ac6101aeadf3b1b8a5649aea4cc10cbe2d7c2e2e2594b9b33c1af94926be72c06dfa7fc0c170f3964d0641a78298f46781bbf4929dce985facf3e91135ec97ee73362f7f276e8b8452c589907aa209702e9779d77c5c60ff04749457c80fa9d2d1c9f4f04b9527f4506337746d63f1ecff37985e022cf7b9c4b1c03f6305bbc1c7175df2"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0xf0, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '%&/]\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'macsec0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x03\x03\x03\x03\x03\x03'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\r}-#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '@-{/!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'sit0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'ip6_vti0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0xa4, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xcea}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x03\x03\x03\x03\x03\x03'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '}&}R)(}/-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '![,)^T(\xde)[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x797}]}]}]}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @ETHTOOL_A_EEE_MODES_OURS={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x100}, @ETHTOOL_A_BITSET_VALUE={0xf1, 0x4, "37174416004ca6f7355bfb4c455f0cbd1a46132a2130ceea7006f36d0a3f33f1baa20ada3c25f595ea3763c4e7031e65fe8180d9d49f7a4c73b6fe4bebeeef9f67cb5dcf77a27df71fdec331e751b5a42337cce6cd46f4c2176ef12d2ca1afb54b62451a5813cce27998a35dbee690cc457fe7b4989730aaa58386f21998b9e23711b3d6e125f6bc923330c358cef940767a1650e9b5ee13959c2d1399c755094c2615c367fd3d34189f20e18fa03c5aaadc4af560c2cf1b7580c77afb4b7838e7363825ffc7438bbe5e2adacb1e353a1a51e959f69b4a2ce5e9e2f2e4e0e151791574b28998f5e8305f3d2865"}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x6}, @ETHTOOL_A_EEE_MODES_OURS={0xdc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7ff}, @ETHTOOL_A_BITSET_MASK={0xcb, 0x5, "a8883e9603d91d65e694a5614961202fe0040f0df0700a86579716eff2c72702f5ff8f0470a3ca97e289ce4ebe369113fc7684fc4244992efdb25a38e4be85288a390ca7d6772bff8312ee520d7d88821dd9d6462c32a8f0fce7b5be14eb2328acc7eeb38cfeffd2aa28dd6c7a1240832a643b99bd179746bafa077dc61484086e2a5227e18c10ce03dc1e73413069f5005545fe9c1caca2a927d13c1e5d7d1ccb30ca0991fc09d65922876d54347727c47c9bbfd2dff56db1bb4d77b454b9e29768d8be68619f"}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x654}, 0x1, 0x0, 0x0, 0x8000}, 0x24040000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f00000020c0)={'sit0\x00', &(0x7f0000002040)={'syztnl1\x00', r3, 0x4, 0x1f, 0xf3, 0x6, 0x2, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x40, 0x700, 0xce, 0xffffffff}}) ioctl$EXT4_IOC_GET_ES_CACHE(r4, 0xc020662a, &(0x7f0000002100)={0x7, 0x1, 0x4, 0x88f, 0x2, [{0xffffffffffffffff, 0xffffffff, 0x1, '\x00', 0x481}, {0x100, 0x6, 0x9a4, '\x00', 0x880}]}) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f0000002300)={&(0x7f00000021c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000022c0)={&(0x7f0000002200)={0xb8, 0x0, 0x800, 0x70bd27, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0xd}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x884}, 0x50801) fremovexattr(0xffffffffffffffff, &(0x7f0000002340)=@known='trusted.overlay.origin\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r7, &(0x7f0000002480)={&(0x7f0000002380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000002440)={&(0x7f0000002400)={0x28, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x40040cd}, 0x80) [ 753.859324] Invalid ELF header len 9 04:05:06 executing program 2: r0 = getpid() setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x1f, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0}, 0x11838, 0xfffffffffffffffc, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) 04:05:06 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1e, r0, 0x0, 0x0) 04:05:06 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1c, r0, 0x0, 0x0) 04:05:06 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x12, r0, 0x0, 0x0) 04:05:06 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x500000000000000) 04:05:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, 0x0) [ 753.922632] loop3: detected capacity change from 0 to 256 [ 753.934287] nfs4: Unknown parameter '‰' [ 753.959296] Invalid ELF header len 9 [ 753.966441] Invalid ELF header len 9 [ 754.103106] loop3: detected capacity change from 0 to 256 [ 754.111633] nfs4: Unknown parameter '‰' 04:05:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, 0x0) 04:05:17 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x600000000000000) 04:05:17 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x13, r0, 0x0, 0x0) 04:05:17 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) 04:05:17 executing program 5: r0 = inotify_init1(0xc0000) sendfile(0xffffffffffffffff, r0, &(0x7f0000000100)=0x1, 0x1c9) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x201) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="a811b416240013000002000892675a9eed92a8c20c45248749b7df52000000ce92000000082af67a1bfa", 0x2a}, {&(0x7f0000000080)="3cd20c5d3b234aa37305963a7d9a1116c52c2f634facf5b74f87c644aa343dcf8555915f", 0x24}], 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000140)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 04:05:17 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x9, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000140)=0xc) setuid(r1) chroot(&(0x7f00000006c0)='./file0\x00') fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040), &(0x7f0000000180), 0x2, 0x2) umount2(&(0x7f00000000c0)='./file1\x00', 0x0) fsync(r0) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) openat(r4, &(0x7f00000001c0)='./file1\x00', 0x80, 0x0) 04:05:17 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x47, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) 04:05:17 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1d, r0, 0x0, 0x0) [ 765.545182] Invalid ELF header len 9 04:05:17 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x14, r0, 0x0, 0x0) 04:05:17 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000000)={0x2000}) finit_module(r1, 0x0, 0x6) 04:05:17 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x700000000000000) 04:05:17 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) keyctl$chown(0x4, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x80, 0x20, 0x6, 0x30, 0x66, 0x0, 0x4, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_config_ext={0x80, 0x6}, 0x1, 0x7fffffff, 0x690d0000, 0x5, 0x7ff, 0x5, 0x3, 0x0, 0x800, 0x0, 0x80000000}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xc) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x2, 0x5, 0x1, 0x1, 0x0, 0xfffffffffffffffe, 0x80000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x800, 0xa5f6, 0x1, 0x8, 0x800, 0x401, 0x4, 0x0, 0x10001, 0x0, 0xffffffffffffffe1}, 0x0, 0x0, r3, 0xa) 04:05:17 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1e, r0, 0x0, 0x0) 04:05:17 executing program 5: r0 = memfd_create(&(0x7f0000000040)=':\xb93\xfc\xbc\x95^Gph\xb6\xb0\xc3|\xf6[A\f\xf3+t\x8e\xf8\xecB\xe8\x97\xb1\x93\x13X_s\xc2\fG\xd4!\xbc}4\xbc\xa70\x1b\x19\x8e~\t8\x1ay:\x11=\xce\xc5Y?\xd9kn\xb5\xaf\xa7}\xa8\xe8\xf5\xe4\xbb\x10\x1e\xea\x14\xfa\xff\xff\xffG(2\x11\x84\x8f\x820\xa2\xac=\xd4AF\x11\x83(\xa5\xf0\xa5\x82\xc3m\x01\x90{\xfd\x8bQ\xd5\xa2T\xc4\xb0\\~\\#\x7f/}\x96\xa6\xa3,\xe4\xd6\x96f\x9fmg\xe5`\xfd!C]9[\xe1\v%\xd4Y\x81\x8d\xcc\xcac\x97\xfaQ\xfaM\xd3\x8bNn\xa0\xe6cT\xd7B\x8d\xaf\x86c\xd2\x8f\x1f\x9f\xb4MOU\xd7\xfc\x9d\xab\x8f\xfb\xa7\xc4\xcc3F\x19V\xd3\xfeX\xce\xe6\x9c\x85\x7f\xfd\xb9u\xa0BeaJ4\x9a\xf4?\x88n\x04\xd5.\xda\xacdA6\xc6\r|\x8f\xd99\xad<\x91\x00\xa9\xa9\x94%&\xdd\xd5\xd5\bFX\xf3\x8f', 0x7) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) flock(r1, 0x0) ftruncate(r0, 0x8800000) ftruncate(r0, 0x0) 04:05:17 executing program 3: set_mempolicy(0x5, &(0x7f0000000040)=0x40203, 0x6) syz_io_uring_setup(0x6308, &(0x7f0000000140), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) [ 765.776152] Invalid ELF header len 9 04:05:18 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x15, r0, 0x0, 0x0) [ 766.672070] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 766.673544] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 766.676073] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 766.677525] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 766.679684] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 766.681830] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 766.683347] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 766.684675] Bluetooth: hci7: Opcode 0x0c1a failed: -4 [ 767.898804] Bluetooth: hci0: command 0x0c1a tx timeout [ 768.730808] Bluetooth: hci7: command 0x0c1a tx timeout [ 768.731336] Bluetooth: hci6: command 0x0c1a tx timeout [ 768.731835] Bluetooth: hci5: command 0x0c1a tx timeout [ 768.731875] Bluetooth: hci4: command 0x0c1a tx timeout [ 768.732293] Bluetooth: hci3: command 0x0c1a tx timeout [ 768.732309] Bluetooth: hci2: command 0x0c1a tx timeout [ 768.732324] Bluetooth: hci1: command 0x0c1a tx timeout 04:05:28 executing program 6: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) fork() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0, 0x0}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x80000, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x400, 0x0) dup3(r2, r3, 0x80000) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0)=r1, 0x12) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r4, 0x0) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "ba5e992d699705e8b6459e38e31e4288477a94cd2c1ad185aa128621c294494795edbbee1f64bfb7ef63b86de856d7e9bdffce439a844ae6bb3b653a9462688e", 0x3e}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "6c0d93b827fcbf5eb0d638dd6c73e3a21ef1922b9aa8724cd4be3893e40767b9deffd7b9f67736d6b0ea229920818b436dc511c3b65243e997c3f8db505afe42", 0x18}, 0x48, r5) keyctl$chown(0x4, r5, r4, 0x0) 04:05:28 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x101}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) fcntl$addseals(r0, 0x409, 0x4) finit_module(r1, 0x0, 0x6) 04:05:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x5, 0x40, 0x4, 0x17, 0x0, 0x10001, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_config_ext={0x0, 0x3f}, 0x11000, 0x6, 0x80000001, 0x3, 0x5, 0xdd24, 0x0, 0x0, 0xffff0ce4, 0x0, 0x3}, 0x0, 0x1, r0, 0x2) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x1, 0x3, 0x5d7}) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0xa00000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x9, 0xffffffffffffffe0, 0x3, 0x2000004}) 04:05:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 1) 04:05:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000080)='veth0_to_bond\x00', 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000002040)={0x0, 0x0, &(0x7f0000002000)={&(0x7f0000000280)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0103f2ff0000000008e9240000000c00090000000100", @ANYRES32], 0x20}}, 0x0) 04:05:28 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x18, r0, 0x0, 0x0) 04:05:28 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x900000000000000) 04:05:28 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0x0, @none}, &(0x7f00000000c0)=0xe, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$chown(0x4, 0x0, 0xee00, 0xee00) keyctl$chown(0x4, 0x0, 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r5, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r3, r4, r5}}, 0x71) keyctl$chown(0x4, 0x0, r2, r4) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000100)) 04:05:28 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = memfd_create(&(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV+C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe ?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0E\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x19\xad|\xcc+\x8eT\x9f\xce}\xd9\r\x1c\xcf\xeb\xc5\xc9\xf1\x9c@\xf5H\xaa\xea\x1f\xcb\x88\x92_Ru\xe9\x01~&\x03\v\xb1\x92\x96)\x82\xc5ai', 0x2) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) [ 776.721282] FAULT_INJECTION: forcing a failure. [ 776.721282] name failslab, interval 1, probability 0, space 0, times 0 [ 776.722345] CPU: 1 UID: 0 PID: 7247 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 776.722365] Tainted: [W]=WARN [ 776.722369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 776.722376] Call Trace: [ 776.722380] [ 776.722385] dump_stack_lvl+0xfa/0x120 [ 776.722406] should_fail_ex+0x4d7/0x5e0 [ 776.722426] ? __do_sys_memfd_create+0x1e5/0xaa0 [ 776.722443] should_failslab+0xc2/0x120 [ 776.722456] __kmalloc_cache_noprof+0x80/0x780 [ 776.722479] ? __do_sys_memfd_create+0x1e5/0xaa0 [ 776.722495] __do_sys_memfd_create+0x1e5/0xaa0 [ 776.722511] ? ksys_write+0x1a3/0x240 [ 776.722529] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 776.722545] ? irqentry_exit+0xee/0x650 [ 776.722558] ? trace_hardirqs_on_prepare+0xe3/0x110 [ 776.722573] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 776.722593] do_syscall_64+0xbf/0x420 [ 776.722610] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 776.722622] RIP: 0033:0x7f0eb800fb19 [ 776.722632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 776.722643] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 776.722654] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0eb800fb19 [ 776.722662] RDX: 0000000001003000 RSI: 0000000000000000 RDI: 00007f0eb80690fb [ 776.722669] RBP: 0000000000000005 R08: 0008000000001800 R09: ffffffffffffffff [ 776.722677] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 776.722683] R13: 0000000020000100 R14: 0000000001003000 R15: 0000000020013800 [ 776.722701] [ 776.746031] Invalid ELF header len 9 [ 776.754214] Invalid ELF header len 9 04:05:28 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x0, 0x25, 0x1, 0x1, 0x0, 0x2, 0x201, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x8000, 0x20, 0x81, 0x3, 0x9, 0x1, 0x432, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x4) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) 04:05:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 2) 04:05:28 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x1000000000000000) [ 776.852627] Invalid ELF header len 9 04:05:29 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x19, r0, 0x0, 0x0) 04:05:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = io_uring_setup(0x5053, &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r1, 0x4, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$getown(r2, 0x10) r3 = signalfd4(r0, &(0x7f0000000080)={[0x3ff]}, 0x8, 0x80800) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0xc020662a, &(0x7f0000000280)=ANY=[@ANYBLOB="09ec7600000000005dff000000000000000000000300000002000000000000000100000000000000040000000000000000501f0800000000000000000000ac58000000000000000000000419000000000000000000000000000007000000000000000000000000000000008000000000000000000091e7d4810026bce8f795b05f370a000000000800000000000000000000a129b9a4e202ae7f7ac5119c1b5de98266cf55c039e116caf8c418b0d24d1a703e7ca98343"]) readahead(0xffffffffffffffff, 0x0, 0x0) readahead(r0, 0x0, 0xfffffffffffffffc) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ftruncate(0xffffffffffffffff, 0x9) finit_module(0xffffffffffffffff, 0x0, 0x6) fsync(0xffffffffffffffff) readahead(0xffffffffffffffff, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002200), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) 04:05:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 3) 04:05:29 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x1c00000000000000) [ 776.943578] FAULT_INJECTION: forcing a failure. [ 776.943578] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 776.944610] CPU: 1 UID: 0 PID: 7282 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 776.944629] Tainted: [W]=WARN [ 776.944633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 776.944641] Call Trace: [ 776.944645] [ 776.944649] dump_stack_lvl+0xfa/0x120 [ 776.944672] should_fail_ex+0x4d7/0x5e0 [ 776.944696] strncpy_from_user+0x3b/0x2f0 [ 776.944712] __do_sys_memfd_create+0x21d/0xaa0 [ 776.944738] ? ksys_write+0x1a3/0x240 [ 776.944756] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 776.944773] ? irqentry_exit+0xee/0x650 [ 776.944785] ? trace_hardirqs_on_prepare+0xe3/0x110 [ 776.944800] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 776.944819] do_syscall_64+0xbf/0x420 [ 776.944835] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 776.944848] RIP: 0033:0x7f0eb800fb19 [ 776.944857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 776.944869] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 776.944881] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0eb800fb19 [ 776.944888] RDX: 0000000001003000 RSI: 0000000000000000 RDI: 00007f0eb80690fb [ 776.944896] RBP: 0000000000000005 R08: 0008000000001800 R09: ffffffffffffffff [ 776.944903] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 776.944910] R13: 0000000020000100 R14: 0000000001003000 R15: 0000000020013800 [ 776.944927] [ 776.984535] Invalid ELF header len 9 04:05:39 executing program 5: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x946eb411e4f6dbae}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) r5 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) 04:05:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x964e060000000000) 04:05:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 4) 04:05:39 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) dup3(r1, r2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) keyctl$chown(0x4, r0, 0x0, 0x0) 04:05:39 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = getpid() setpriority(0x0, r1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0xc8, 0x94, 0xfe, 0x20, 0x0, 0xe1b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7e, 0x0, @perf_config_ext={0x6453, 0x3}, 0x40, 0xe2f, 0x84, 0xc, 0x1, 0x4, 0x1ff, 0x0, 0x6, 0x0, 0x266}, r1, 0x4, r4, 0x0) keyctl$chown(0x4, r0, 0x0, 0x0) 04:05:39 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x80, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xff6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) 04:05:39 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001a80), 0x2}, 0x42000, 0x0, 0x8, 0x0, 0x0, 0x616f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x145c02, 0x0) io_setup(0xfff, &(0x7f0000000040)) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f00000000c0)=[&(0x7f0000000280)={0x0, 0x0, 0x8, 0x8, 0x0, r2, &(0x7f0000000000)="fa", 0x1, 0xfffffffffffffffc}]) io_setup(0x8, &(0x7f0000000100)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r6 = dup3(0xffffffffffffffff, r5, 0x0) getsockopt$packet_buf(r6, 0x107, 0x6, 0x0, &(0x7f0000000440)) io_submit(0x0, 0x3, &(0x7f0000001e40)=[&(0x7f0000001c40)={0x0, 0x0, 0x0, 0x1, 0x1, 0xffffffffffffffff, &(0x7f0000001b40)="d84a2a2ce0eac7a821852b9b4f8b50d924e14165d07c62641e2ba4f36529a9805556bb34c37042a50d0648759d8ed0a8c82b9a7c79026d47d1800b969a54008d7247f24d73bfd80fc1248fd88512bf012b6d7e8d8e005f07fda83f9fdf9fd8c425c0d9af2af1266f8fd478689439d57da2d91f4377f52d5ceafcc78af0fa7744e95728961cd0f7a8cfcc74d8bb8082602a4397af610541aba799496f3cb2b4ab283ebd631191aa2861597f77dc3e86a092e86e15bed0aa37cf985f7b788909dcffea5c978bd153103ef4f3fc519737a80596997c934b3f260989796d6a20358778a23583c26f5949acf6c3e2beae703e0612ef70015c928e7f7e8a", 0xfb, 0x80000001, 0x0, 0x0, r1}, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x5, 0xff, r1, &(0x7f0000001c80)="73ae780d8779a2436cc378d54cd90cd704fa29b0267e324da51ab93bb250778e17a1a5533cb335be15bf5a7b1cdc4a23d121946a8731cb02f8147139e61a22ea9ec591e827f4de9d577dbf46fa187da12614d8bf7690efd347b1c4de364f8df6ec1c22c01b52498ea3c4227cfae44bfe4d219724885e944cc775fc06c9a439e7035e2b2329eb86dd950882855a5a85c6092d854058", 0x95, 0x4, 0x0, 0x2}, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x7, 0x5, r1, &(0x7f0000001d80)="51b0f7bb8048d36565261781d583dc402a2fdb3ed08cd699460f01749d42a2da8920aac3f752aacb2c8eb66eb076aa4cd578e01fedd277141c5fdfe9201208d4e1", 0x41, 0x101, 0x0, 0x2, r6}]) r7 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='./binderfs/binder-control\x00', 0xc00, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) getsockopt$packet_buf(r11, 0x107, 0x6, 0x0, &(0x7f0000000440)) r12 = syz_open_dev$mouse(&(0x7f0000001880), 0x4, 0x20100) r13 = open(&(0x7f0000001980)='./file0\x00', 0x28000, 0x84) io_submit(r4, 0xa, &(0x7f0000001a00)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x20, r0, &(0x7f0000000140)="3c3f4dce77c0caf7bb66200d46ad068f697d6162ab4ecc5826a6c1523604d71755321dfd969fc081b9c5b63ab83c7e34f996a53f50a64dff779aa0b70f", 0x3d, 0x2, 0x0, 0x0, r2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x7, r7, &(0x7f0000000200)="d38d98fbd707f78d78e297ca1dafcd14ee927d106edacd6b707cbede960f250ea424cb220f658fdbaf32b0f8d12f545bef12c4507bd62704507b9f0a48a78a42d4b593524b80845a2ff7454abcbba4cdaa2233742fc32979ce16fc35c533a5fee3b5e7e41b61365fa154acf43482d8a4655633b1", 0x74, 0x0, 0x0, 0x4}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x0, r2, &(0x7f0000000300)="eae93723e2fd711e923c59d0b6e4c1c39e460dfdbabc5ada3b7d562d4ea544cff31ee3cb35fe92c31ca80ba6b8202a5b1667d12e538048c8f8b4152cc35785ea4f31e31cc1724361f6765c708a51c67b4b1966f7c98b5f0839ea7d2af28239d1c2f297595dc8692dc83bb667a6f2c218348be4c297edadf484dad1ea9b942cf25a490ff45678b5788c7efc490fe8398a5bb5e75d9d25de1c314f0508105cefe5a0e95baebda296964815817ca589f089fd091f11add78dcd6c3d1db8f76d66468b68ac665fa2bc1616598a", 0xcb, 0x5, 0x0, 0x1, r2}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x2, r8, &(0x7f0000000480)="439535e142b03c1f75253eb7e2c1e40b96981df99e73c6e84525980be773b2e349ed46e07234220cd3b212b232bec290a3763df3eff075d48e5438b5bdd7d809b3f178f086d2b8c85ff2564ed47237b8fd7d86053802e4a383227da6b551f0626f78d2ca74d7be1bd81e1ea2f2dab92dce62775d6c077bc19243bb8b87a9d21299469e265ee1f6b84d3fc190cf2b9bd178f72fc180ba28e7220f3ae3fc0ab2643a42e7424fbbdafbaca3a9e21c14f9d2f9df36a3af6fb5b4b45491ae86d8ed22902f2e921f1c780a", 0xc8, 0x69a}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x2, 0xfff, r0, &(0x7f00000005c0)="0dffb2efc62007a2f536211fe91df5f016ac879deb99cc2cf40d0be5582f6782f0e1e2a71aec7265c8aa1006d9b6ed8c22747c1567e3ef4b800114ffaa268999d28c3f6a4b57489f20f794ec71137f43e7a71add28efbe0e1a1bfcce195b2a8e465914676b654ed2ae5c749c8a660c4c1b5ea26f36f8fb1b3c84091dede0524f0c67ddd933eed4", 0x87, 0x2, 0x0, 0x0, r2}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x6, 0x9d, r0, 0xffffffffffffffff, 0x0, 0x9, 0x0, 0x1}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x7, r2, &(0x7f0000000700)="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", 0x1000, 0xffffffff, 0x0, 0x0, r2}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x3, 0x40, r0, &(0x7f0000001740)="980735824cbe07d64ec6c9afbf165e526712a3d239d17ba380f20866909573502d5a45d19d6e6beba8e64eb2fa44bd5a9f8320035da0fca52f3909d89f8a3fde40e85ed05eb82c6680e9d4bab53d26ffcae5795cbd1ab5ad1a56f27f31fd4cfc713e12c337eeeac1070bc09939c225b69cab972016d9c2e09059e688d5a2b7dcd344714da26f9a1ac5b2ee6d54379b438a042f94d82480addae53045618b1f0e5569cc23", 0xa4, 0x7, 0x0, 0x0, r11}, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0xb, 0x9, 0xffffffffffffffff, &(0x7f0000001840)="c2f014c81be9098708990be824910b0656ce554ad94b9ea669e81163f3c94cdf3973af98355d05ea6db2d1965abaf0e1dd902560", 0x34, 0x49e, 0x0, 0x2, r12}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0xfff9, r0, &(0x7f0000001900)="6333ede14f7c5f338cbb4ecd36a8b7fd40de4e98d4e2e6af6256aea36d7b630ef0a7971371c514c2a6e64f750ad6c3b0c877443e4fe581884a955fdaa11d1471f3f337efe261610863e97258135a99f47f9659d580a61a79a4dd0053ff0f4c9ec863b7dc4b76a215b8794a43037ca35c1b31b8c85bf209", 0x77, 0x8cb0, 0x0, 0x2, r13}]) 04:05:39 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1b, r0, 0x0, 0x0) [ 786.952146] FAULT_INJECTION: forcing a failure. [ 786.952146] name failslab, interval 1, probability 0, space 0, times 0 [ 786.953168] CPU: 1 UID: 0 PID: 7303 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 786.953187] Tainted: [W]=WARN [ 786.953192] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 786.953199] Call Trace: [ 786.953204] [ 786.953208] dump_stack_lvl+0xfa/0x120 [ 786.953231] should_fail_ex+0x4d7/0x5e0 [ 786.953257] ? shmem_alloc_inode+0x27/0x50 [ 786.953287] should_failslab+0xc2/0x120 [ 786.953300] kmem_cache_alloc_lru_noprof+0x84/0x770 [ 786.953327] ? shmem_alloc_inode+0x27/0x50 [ 786.953344] shmem_alloc_inode+0x27/0x50 [ 786.953361] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 786.953379] alloc_inode+0x67/0x250 [ 786.953396] new_inode+0x1e/0x160 [ 786.953411] __shmem_get_inode+0x17c/0xe80 [ 786.953427] __shmem_file_setup+0x108/0x370 [ 786.953442] __do_sys_memfd_create+0x2ce/0xaa0 [ 786.953461] ? ksys_write+0x1a3/0x240 [ 786.953479] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 786.953495] ? irqentry_exit+0xee/0x650 [ 786.953507] ? trace_hardirqs_on_prepare+0xe3/0x110 [ 786.953522] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 786.953542] do_syscall_64+0xbf/0x420 [ 786.953558] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 786.953570] RIP: 0033:0x7f0eb800fb19 [ 786.953580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.953591] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 786.953602] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0eb800fb19 [ 786.953610] RDX: 0000000001003000 RSI: 0000000000000000 RDI: 00007f0eb80690fb [ 786.953617] RBP: 0000000000000005 R08: 0008000000001800 R09: ffffffffffffffff [ 786.953625] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 786.953632] R13: 0000000020000100 R14: 0000000001003000 R15: 0000000020013800 [ 786.953649] [ 787.024355] Invalid ELF header len 9 04:05:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 5) 04:05:39 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1c, r0, 0x0, 0x0) 04:05:39 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1882}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x9, 0x8, 0x94, 0x0, 0x84, 0x20040, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffbff, 0x2, @perf_config_ext={0x1}, 0x1, 0x8, 0x6, 0x2, 0xffffffff, 0x4c1d2fcc, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x5, 0xffffffffffffffff, 0x18) [ 787.055323] 9pnet_fd: p9_fd_create_tcp (7314): problem connecting socket to 127.0.0.1 04:05:39 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) clone3(&(0x7f00000013c0)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200), {0x35}, &(0x7f0000000240)=""/148, 0x94, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=[0xffffffffffffffff], 0x1, {r3}}, 0x58) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) ftruncate(r4, 0x88) 04:05:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 6) [ 787.151896] 9pnet_fd: p9_fd_create_tcp (7331): problem connecting socket to 127.0.0.1 [ 787.166823] FAULT_INJECTION: forcing a failure. [ 787.166823] name failslab, interval 1, probability 0, space 0, times 0 [ 787.167970] CPU: 1 UID: 0 PID: 7333 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 787.167990] Tainted: [W]=WARN [ 787.167994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 787.168002] Call Trace: [ 787.168006] [ 787.168011] dump_stack_lvl+0xfa/0x120 [ 787.168035] should_fail_ex+0x4d7/0x5e0 [ 787.168060] ? security_inode_alloc+0x3e/0x130 [ 787.168084] should_failslab+0xc2/0x120 [ 787.168099] kmem_cache_alloc_noprof+0x80/0x760 [ 787.168120] ? __pfx_map_id_range_down+0x10/0x10 [ 787.168141] ? __create_object+0x59/0x80 [ 787.168162] ? security_inode_alloc+0x3e/0x130 [ 787.168179] security_inode_alloc+0x3e/0x130 [ 787.168198] inode_init_always_gfp+0xc9d/0xff0 [ 787.168222] alloc_inode+0x8d/0x250 [ 787.168239] new_inode+0x1e/0x160 [ 787.168256] __shmem_get_inode+0x17c/0xe80 [ 787.168274] __shmem_file_setup+0x108/0x370 [ 787.168290] __do_sys_memfd_create+0x2ce/0xaa0 [ 787.168308] ? ksys_write+0x1a3/0x240 [ 787.168327] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 787.168343] ? irqentry_exit+0xee/0x650 [ 787.168357] ? trace_hardirqs_on_prepare+0xe3/0x110 [ 787.168373] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 787.168393] do_syscall_64+0xbf/0x420 [ 787.168411] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 787.168424] RIP: 0033:0x7f0eb800fb19 [ 787.168434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 787.168446] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 787.168458] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0eb800fb19 [ 787.168467] RDX: 0000000001003000 RSI: 0000000000000000 RDI: 00007f0eb80690fb [ 787.168474] RBP: 0000000000000005 R08: 0008000000001800 R09: ffffffffffffffff [ 787.168482] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 787.168490] R13: 0000000020000100 R14: 0000000001003000 R15: 0000000020013800 [ 787.168508] 04:05:49 executing program 5: syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x100001, &(0x7f0000000000)=ANY=[@ANYBLOB='iocharset=cp775,cruft=']) 04:05:49 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1d, r0, 0x0, 0x0) 04:05:49 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="b3e279fb6d60373dfdc5d9fff74cd0216574c0abae7b5274e1b8d07ff39a71198dfe2e4729f8586dc1cedd31829e72ed9d95f1f60611c50c63687b35b4b19e10b8ede8d5066907191172d232a9e218e39f653a56879710b926a6b7c50a7203c78cb6f5746bc8580e4307de300f31580590a970328561871cbd4ffa1225b07cb424a91a830ee1ccd6ffe3a08ab22ba14402685e5b88d4a30544b2ee806287c42fa5cfab58ec43f10698", 0xa9, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="f43d799cd007f33d5bbe818bdcc9ac6b8924cf8dbf720ea949ff41692a406bccfe9a59dfc3b641e931997284f582074e75d03df997b4c554d447706ce9a0fb067d25f207ece5642aff3c54f4b99afafc764b816617fe546b7f09c42170c4e6217e44830ec0c930db17bbcd34af32176bf12f2bfcae66b0270eab185de0d77f8f6019c1e37769e128955c0d31db9a29f6eb17068ef2e3", 0x96, r2) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) r3 = geteuid() keyctl$chown(0x4, r1, r3, 0x0) keyctl$chown(0x4, r0, 0x0, 0x0) 04:05:49 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) ioctl$FIOCLEX(r0, 0x5451) finit_module(r1, 0x0, 0x6) 04:05:49 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0xaf07000000000000) 04:05:49 executing program 6: sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x0, 0x300, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000801}, 0x2400c040) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x4, 0x0, 0x0, 0x0, 0x13420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:05:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 7) 04:05:49 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001a80), 0x2}, 0x42000, 0x0, 0x8, 0x0, 0x0, 0x616f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x145c02, 0x0) io_setup(0xfff, &(0x7f0000000040)) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f00000000c0)=[&(0x7f0000000280)={0x0, 0x0, 0x8, 0x8, 0x0, r2, &(0x7f0000000000)="fa", 0x1, 0xfffffffffffffffc}]) io_setup(0x8, &(0x7f0000000100)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r6 = dup3(0xffffffffffffffff, r5, 0x0) getsockopt$packet_buf(r6, 0x107, 0x6, 0x0, &(0x7f0000000440)) io_submit(0x0, 0x3, &(0x7f0000001e40)=[&(0x7f0000001c40)={0x0, 0x0, 0x0, 0x1, 0x1, 0xffffffffffffffff, &(0x7f0000001b40)="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", 0xfb, 0x80000001, 0x0, 0x0, r1}, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x5, 0xff, r1, &(0x7f0000001c80)="73ae780d8779a2436cc378d54cd90cd704fa29b0267e324da51ab93bb250778e17a1a5533cb335be15bf5a7b1cdc4a23d121946a8731cb02f8147139e61a22ea9ec591e827f4de9d577dbf46fa187da12614d8bf7690efd347b1c4de364f8df6ec1c22c01b52498ea3c4227cfae44bfe4d219724885e944cc775fc06c9a439e7035e2b2329eb86dd950882855a5a85c6092d854058", 0x95, 0x4, 0x0, 0x2}, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x7, 0x5, r1, &(0x7f0000001d80)="51b0f7bb8048d36565261781d583dc402a2fdb3ed08cd699460f01749d42a2da8920aac3f752aacb2c8eb66eb076aa4cd578e01fedd277141c5fdfe9201208d4e1", 0x41, 0x101, 0x0, 0x2, r6}]) r7 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='./binderfs/binder-control\x00', 0xc00, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) getsockopt$packet_buf(r11, 0x107, 0x6, 0x0, &(0x7f0000000440)) r12 = syz_open_dev$mouse(&(0x7f0000001880), 0x4, 0x20100) r13 = open(&(0x7f0000001980)='./file0\x00', 0x28000, 0x84) io_submit(r4, 0xa, &(0x7f0000001a00)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x20, r0, &(0x7f0000000140)="3c3f4dce77c0caf7bb66200d46ad068f697d6162ab4ecc5826a6c1523604d71755321dfd969fc081b9c5b63ab83c7e34f996a53f50a64dff779aa0b70f", 0x3d, 0x2, 0x0, 0x0, r2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x7, r7, &(0x7f0000000200)="d38d98fbd707f78d78e297ca1dafcd14ee927d106edacd6b707cbede960f250ea424cb220f658fdbaf32b0f8d12f545bef12c4507bd62704507b9f0a48a78a42d4b593524b80845a2ff7454abcbba4cdaa2233742fc32979ce16fc35c533a5fee3b5e7e41b61365fa154acf43482d8a4655633b1", 0x74, 0x0, 0x0, 0x4}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x0, r2, &(0x7f0000000300)="eae93723e2fd711e923c59d0b6e4c1c39e460dfdbabc5ada3b7d562d4ea544cff31ee3cb35fe92c31ca80ba6b8202a5b1667d12e538048c8f8b4152cc35785ea4f31e31cc1724361f6765c708a51c67b4b1966f7c98b5f0839ea7d2af28239d1c2f297595dc8692dc83bb667a6f2c218348be4c297edadf484dad1ea9b942cf25a490ff45678b5788c7efc490fe8398a5bb5e75d9d25de1c314f0508105cefe5a0e95baebda296964815817ca589f089fd091f11add78dcd6c3d1db8f76d66468b68ac665fa2bc1616598a", 0xcb, 0x5, 0x0, 0x1, r2}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x2, r8, &(0x7f0000000480)="439535e142b03c1f75253eb7e2c1e40b96981df99e73c6e84525980be773b2e349ed46e07234220cd3b212b232bec290a3763df3eff075d48e5438b5bdd7d809b3f178f086d2b8c85ff2564ed47237b8fd7d86053802e4a383227da6b551f0626f78d2ca74d7be1bd81e1ea2f2dab92dce62775d6c077bc19243bb8b87a9d21299469e265ee1f6b84d3fc190cf2b9bd178f72fc180ba28e7220f3ae3fc0ab2643a42e7424fbbdafbaca3a9e21c14f9d2f9df36a3af6fb5b4b45491ae86d8ed22902f2e921f1c780a", 0xc8, 0x69a}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x2, 0xfff, r0, &(0x7f00000005c0)="0dffb2efc62007a2f536211fe91df5f016ac879deb99cc2cf40d0be5582f6782f0e1e2a71aec7265c8aa1006d9b6ed8c22747c1567e3ef4b800114ffaa268999d28c3f6a4b57489f20f794ec71137f43e7a71add28efbe0e1a1bfcce195b2a8e465914676b654ed2ae5c749c8a660c4c1b5ea26f36f8fb1b3c84091dede0524f0c67ddd933eed4", 0x87, 0x2, 0x0, 0x0, r2}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x6, 0x9d, r0, 0xffffffffffffffff, 0x0, 0x9, 0x0, 0x1}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x7, r2, &(0x7f0000000700)="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", 0x1000, 0xffffffff, 0x0, 0x0, r2}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x3, 0x40, r0, &(0x7f0000001740)="980735824cbe07d64ec6c9afbf165e526712a3d239d17ba380f20866909573502d5a45d19d6e6beba8e64eb2fa44bd5a9f8320035da0fca52f3909d89f8a3fde40e85ed05eb82c6680e9d4bab53d26ffcae5795cbd1ab5ad1a56f27f31fd4cfc713e12c337eeeac1070bc09939c225b69cab972016d9c2e09059e688d5a2b7dcd344714da26f9a1ac5b2ee6d54379b438a042f94d82480addae53045618b1f0e5569cc23", 0xa4, 0x7, 0x0, 0x0, r11}, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0xb, 0x9, 0xffffffffffffffff, &(0x7f0000001840)="c2f014c81be9098708990be824910b0656ce554ad94b9ea669e81163f3c94cdf3973af98355d05ea6db2d1965abaf0e1dd902560", 0x34, 0x49e, 0x0, 0x2, r12}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0xfff9, r0, &(0x7f0000001900)="6333ede14f7c5f338cbb4ecd36a8b7fd40de4e98d4e2e6af6256aea36d7b630ef0a7971371c514c2a6e64f750ad6c3b0c877443e4fe581884a955fdaa11d1471f3f337efe261610863e97258135a99f47f9659d580a61a79a4dd0053ff0f4c9ec863b7dc4b76a215b8794a43037ca35c1b31b8c85bf209", 0x77, 0x8cb0, 0x0, 0x2, r13}]) [ 797.434488] Invalid ELF header len 9 04:05:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 8) 04:05:49 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='-%-,\x00', r0) [ 797.449577] Invalid ELF header len 9 04:05:49 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) r4 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x17, 0x7f, 0x2, 0x3, 0x0, 0x1, 0x2044, 0xe, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x1000, 0x6, 0x400, 0x3, 0x40, 0xfffffffe, 0x200, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x3, r3, 0x14) ftruncate(0xffffffffffffffff, 0xd) finit_module(r0, 0x0, 0x6) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, 0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000040)=0x1) r5 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) getsockopt$packet_buf(r7, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$BINDER_CTL_ADD(r7, 0xc1086201, &(0x7f0000000200)={'custom1\x00'}) 04:05:49 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x1e, r0, 0x0, 0x0) 04:05:49 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@subsystem='net_prio'}, {@name={'name', 0x3d, '\x00\x00\x00'}}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000002440)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xfc7b, 0x3, &(0x7f0000002280)=[{&(0x7f0000000200)="96fa31abbdc88cfd515892c93506958343e49068da72a97c00e11fb8df3be23aa7b3e925d485167f7c660d85528a9e087065bec13c7606c3e045a2ea00999683fff87c10926682d6812f94fd3b556f", 0x4f, 0x5}, {&(0x7f0000000280)="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", 0x1000, 0xffffffffffffff13}, {&(0x7f0000001280)="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", 0x1000, 0x2}], 0x1000000, &(0x7f0000002480)={[{@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x32, 0x39]}}, {@size={'size', 0x3d, [0x2d, 0x25, 0x32, 0x74, 0x74, 0x33, 0x33, 0x6b]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x30, 0x2d, 0x32, 0x39, 0x37]}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x25, 0x36, 0x65]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x65, 0x30, 0x6d]}}, {@mode={'mode', 0x3d, 0x101}}, {@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x32, 0x67, 0x34, 0x33, 0x35, 0x65]}}], [{@seclabel}, {@context={'context', 0x3d, 'root'}}, {@hash}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfshat={'smackfshat', 0x3d, '/^*-)'}}]}) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x1000) [ 797.540321] FAULT_INJECTION: forcing a failure. [ 797.540321] name failslab, interval 1, probability 0, space 0, times 0 [ 797.541248] CPU: 1 UID: 0 PID: 7370 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 797.541267] Tainted: [W]=WARN [ 797.541271] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 797.541279] Call Trace: [ 797.541283] [ 797.541288] dump_stack_lvl+0xfa/0x120 [ 797.541311] should_fail_ex+0x4d7/0x5e0 [ 797.541336] ? __d_alloc+0x34/0xa10 [ 797.541348] should_failslab+0xc2/0x120 [ 797.541361] kmem_cache_alloc_lru_noprof+0x84/0x770 [ 797.541382] ? find_held_lock+0x2b/0x80 [ 797.541413] ? __d_alloc+0x34/0xa10 [ 797.541423] __d_alloc+0x34/0xa10 [ 797.541433] ? mpol_shared_policy_init+0x24f/0x390 [ 797.541461] d_alloc_pseudo+0x1d/0xc0 [ 797.541480] alloc_file_pseudo+0xbe/0x220 [ 797.541498] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 797.541512] ? __shmem_get_inode+0x684/0xe80 [ 797.541531] __shmem_file_setup+0x1a8/0x370 [ 797.541550] __do_sys_memfd_create+0x2ce/0xaa0 [ 797.541567] ? ksys_write+0x1a3/0x240 [ 797.541584] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 797.541600] ? irqentry_exit+0xee/0x650 [ 797.541613] ? trace_hardirqs_on_prepare+0xe3/0x110 [ 797.541630] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 797.541649] do_syscall_64+0xbf/0x420 [ 797.541672] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 797.541689] RIP: 0033:0x7f0eb800fb19 [ 797.541699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 797.541710] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 797.541727] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0eb800fb19 [ 797.541735] RDX: 0000000001003000 RSI: 0000000000000000 RDI: 00007f0eb80690fb [ 797.541742] RBP: 0000000000000005 R08: 0008000000001800 R09: ffffffffffffffff [ 797.541749] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 797.541756] R13: 0000000020000100 R14: 0000000001003000 R15: 0000000020013800 [ 797.541778] 04:05:49 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x7f, 0x1, 0x1, 0x20, 0x0, 0x4, 0xd2451, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffff7, 0x2, @perf_config_ext={0x0, 0x3ad}, 0x8200, 0x4, 0x5, 0x2, 0x78, 0x2, 0x1, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0x1, r0, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='./file1\x00', &(0x7f0000000200)='./file0\x00') openat$sr(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) finit_module(r3, 0x0, 0x6) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000002c0)={0x0, 0x2, 0x4, 0x7}) keyctl$chown(0x4, r2, 0x0, 0x0) add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="17fbbb1b03b8733ed1dd13bfce3785642528dfd29e981feb399a3b5dd13925d8d171725eb2f818d25c311e85e702d0c2752296f00d93942c4c2e56e84a01c918921f8e96de32731ca188950bdfdbc7b99d77be4702b6124c2bed1144432e3bd8471c97490375fdc98804f34fcf3992c566a540cd636313c1463f170f394ca4f1a6d25720c6af1f8c0d69925fd12307c7182e126f56966592d5042be0fd151b47ace1d13cb882ec2ee2fb172f1497995ad931e8585af021e1b839971005b76702620a2fd0", 0xc4, 0xffffffffffffffff) 04:05:49 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0xffffffff00000000) 04:05:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 9) 04:05:49 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="00f37d0000000000", @ANYRES32=r0, @ANYBLOB="f9ffffff0000000000"]) fchdir(r1) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, r4, 0xee01) keyctl$chown(0x4, r2, 0x0, 0x0) getsockname$unix(r1, &(0x7f0000000100), &(0x7f0000000200)=0x6e) [ 797.681921] cgroup: Bad value for 'name' 04:05:49 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) keyctl$revoke(0x3, r1) 04:05:49 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8) [ 797.698666] Invalid ELF header len 9 [ 797.716608] cgroup: Bad value for 'name' 04:05:49 executing program 3: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x3c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffe01}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3902}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffff02}]}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) r0 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x10) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fsmount(r1, 0x1, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001ec0), 0x80, 0x0) dup3(r2, r3, 0x0) fsconfig$FSCONFIG_SET_STRING(r3, 0x1, &(0x7f0000000040)='sysfs\x00', &(0x7f0000000100)='s}\xa6\x0e\xe2\x99\xf9\xe0Z\xc4sf\xfa\x00\xb5\xa9\x19\xb8\xa2}n\x05\xfeR\xb5\xcb\bN\x8b\xde\xfc\x9d\xc2a\xdaw\xe9g\xb8\xf2x\xcc\xa5+\"\xf4\xfc\x82P4\xc2s\x86\xbdv\xd5\b\x1b\x7fL\xb9o\xc4\x9c\xd0k\xe2\x03?Iy\xfe\x93\xe7\xfe\t?m\x04\xda\x00\xc7\xd2I\x86y\xd7/1\x9aI\xf4\xbe\xb7\x8e\xc6\xb3\xfd\xfaL\xb4\xff\xeflCz\xba\xff\x0e\x87+3\xaa\r\xe9\xe9U\xc94v\x91.\xb7\x88/\x9c\x1aZN\xf7\xd4\x11\x1b\xe0\x93\xbc\xf3c\xbd\x84yT\xc0`u\x93#/', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x40040, 0x0) r4 = fork() r5 = fork() setpgid(r5, 0x0) setpgid(r4, r5) 04:05:49 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:05:49 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:05:49 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0xffffffffffff0700) 04:05:49 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="ee4257dc09c4c597e15f7c068924bde7b64ffe5f56335867f40c8400e952d4936795ed151b3b33e51fa71db107cf3577afa9e2fa34c344b014801fe614d6a68b0e835b4bd50228139dceba7c9187f9f9a6b8397c456e4abc2c9f74582532eae275f333746ee55cd9ef6f3bc5a458ea83", 0x70, r0) 04:05:49 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x47}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x7, 0x7, 0x3, 0x7f, 0x0, 0x7fff, 0x104, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x40, 0x2}, 0x43, 0x3, 0xab3b, 0x7, 0x1, 0x0, 0x7ff, 0x0, 0x20, 0x0, 0x7ff}, 0x0, 0xa, r0, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) [ 798.703304] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 798.704392] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 798.706030] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 798.706911] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 798.709074] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 798.710697] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 798.711615] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 798.713885] Bluetooth: hci7: Opcode 0x0c1a failed: -4 [ 799.834855] Bluetooth: hci0: command 0x0c1a tx timeout [ 800.730827] Bluetooth: hci7: command 0x0c1a tx timeout [ 800.731907] Bluetooth: hci6: command 0x0c1a tx timeout [ 800.732936] Bluetooth: hci5: command 0x0c1a tx timeout [ 800.732969] Bluetooth: hci4: command 0x0c1a tx timeout [ 800.733924] Bluetooth: hci3: command 0x0c1a tx timeout [ 800.734373] Bluetooth: hci2: command 0x0c1a tx timeout [ 800.735311] Bluetooth: hci1: command 0x0c1a tx timeout 04:05:59 executing program 7: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendfile(r1, r0, 0x0, 0xca16) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) keyctl$chown(0x4, r2, 0x0, 0x0) 04:05:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x3, 0x4) syz_emit_ethernet(0x10d, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x8}}}}}, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10) 04:05:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0xc1}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0x80000000, 0xa2002) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000040)=0x1) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) 04:05:59 executing program 6: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x8) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) 04:05:59 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000280)=""/96, &(0x7f0000000300)=0x60) finit_module(r1, 0x0, 0x6) r2 = getpid() setpriority(0x0, r2, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x6, 0xaf, 0x8, 0x49, 0x0, 0x80000000, 0x102a, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x4}, 0x800, 0x0, 0xecb, 0x0, 0x2, 0x36cbff0, 0x3, 0x0, 0x1a, 0x0, 0x5}, 0xffffffffffffffff, 0x3, r0, 0x2) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3, 0xa1, 0xfc, 0x5, 0x0, 0x400, 0x20, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0xfffffffffffffffe, 0x4}, 0x0, 0xffffffffffffff8d, 0x4, 0x9, 0x5, 0x63, 0x9, 0x0, 0x6, 0x0, 0x8000}, r2, 0xffffffffffffffff, r3, 0x2) 04:05:59 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r1, 0x0) keyctl$chown(0x4, r0, r1, 0x0) 04:05:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 10) 04:05:59 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2421, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c4, 0x2, &(0x7f0000000200)=[{&(0x7f0000000700)="eb58906d6b66020000000020004000030000000000000001000000000000000000000000006e87c87cf2f7c45339755ad4e8c3997e04d9da8b9f001fefe8967937c0dc8f2c229d0e", 0x48, 0x4}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00f78622783d23fc238a1d3447c1c4efaceaeba3002bef7184f79cfa11440b3e48a1e7da90d661391210023c741f690748b91038212e0000710d0f9b7d5e0f1f834c5a9b602ac64f524a52fc5dd209e669ae4b2d3dca7291595dc534d59b278a1baece65383dbad37252c14bd8a3588f25e1b6aa4e0b16ef092f18152ab08d87a7d50b414b62d7315da795e93bc89a097ea428748eeadb90298dc170d1bf979073116d7ec3c4fbc4849192b946bbc1354bdd1efb0002f8c68202dc01c2d99b4693584e7d43", @ANYRESHEX=r0]) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000400)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000480)=""/104, 0x68}, {&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000001200)=""/245, 0xf5}, {&(0x7f0000001480)=""/17, 0x11}, {&(0x7f0000001400)=""/85, 0x55}], 0x5, &(0x7f0000000b00)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c52ce18000000000000000100000002", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c0000000000000001000000020000001dfa430dbfe61fe7c03c0fca6cc9ae54b99ed0f7b21818b8bcc7a460e317986a4a3872360ed76a053951a6909e3fc9ed08b14e3d81dad16b743b3e67d5f1532426c4c1c6d9", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xe0}, 0x20) mkdirat(r1, &(0x7f0000000a40)='./file0\x00', 0x80) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0) r5 = dup(r4) r6 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') ioctl$SG_IO(r5, 0x2285, &(0x7f0000000680)={0x0, 0xfffffffffffffffd, 0xa7, 0x0, @buffer={0x0, 0xad, &(0x7f0000000140)=""/173}, &(0x7f0000000840)="d381dfcaad9a8bdad31026ba49b7abf38dae9b4da8075863f078fbef1863b2268df150ef053913b5a141c583c4c9fe0195e06b11f766d03d7f88c1c71351cb64994ad062b24078157d222bd326ce8f9d11268d0ca7980e875766c17387367b92971f23095ea17e9d7e1dde25453ce9d248d31b5e4d200f6e4e09f69f3e427498b43d076bb1361d553d35d76e83a7890732843162567ca74fb04be03daa07e1b51e8808a172153e", &(0x7f0000000940)=""/236, 0x3, 0x31, 0x0, &(0x7f00000003c0)}) fcntl$dupfd(r6, 0x0, r6) ioctl$AUTOFS_IOC_ASKUMOUNT(r6, 0x80049370, &(0x7f0000000780)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r9 = dup3(r7, r8, 0x0) perf_event_open(&(0x7f0000000a80)={0x4, 0x80, 0x81, 0x6, 0x37, 0x7, 0x0, 0x400, 0xa000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff9214, 0x2, @perf_config_ext={0x2, 0xfaf3}, 0x830, 0x1ff, 0x9, 0x5, 0x4, 0x1, 0xffff, 0x0, 0x5, 0x0, 0x800}, 0xffffffffffffffff, 0xf, r3, 0x0) getsockopt$packet_buf(r9, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, 0x0) clone3(&(0x7f0000005880)={0x14f804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/1, 0x0}, 0x58) [ 806.991691] Invalid ELF header len 9 [ 806.992144] FAULT_INJECTION: forcing a failure. [ 806.992144] name failslab, interval 1, probability 0, space 0, times 0 [ 806.993943] CPU: 1 UID: 0 PID: 7443 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 806.993964] Tainted: [W]=WARN [ 806.993968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 806.993976] Call Trace: [ 806.993980] [ 806.993984] dump_stack_lvl+0xfa/0x120 [ 806.994008] should_fail_ex+0x4d7/0x5e0 [ 806.994034] ? alloc_empty_file+0x58/0x1e0 [ 806.994050] should_failslab+0xc2/0x120 [ 806.994063] kmem_cache_alloc_noprof+0x80/0x760 [ 806.994084] ? d_instantiate+0x92/0xb0 [ 806.994101] ? alloc_empty_file+0x58/0x1e0 [ 806.994114] ? _raw_spin_unlock+0x1e/0x40 [ 806.994135] alloc_empty_file+0x58/0x1e0 [ 806.994153] alloc_file_pseudo+0x12b/0x220 [ 806.994169] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 806.994193] __shmem_file_setup+0x1a8/0x370 [ 806.994210] __do_sys_memfd_create+0x2ce/0xaa0 [ 806.994227] ? ksys_write+0x1a3/0x240 [ 806.994245] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 806.994269] ? irqentry_exit+0xee/0x650 [ 806.994282] ? trace_hardirqs_on_prepare+0xe3/0x110 [ 806.994301] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 806.994324] do_syscall_64+0xbf/0x420 [ 806.994341] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 806.994353] RIP: 0033:0x7f0eb800fb19 [ 806.994363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 806.994374] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 806.994386] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0eb800fb19 [ 806.994394] RDX: 0000000001003000 RSI: 0000000000000000 RDI: 00007f0eb80690fb [ 806.994401] RBP: 0000000000000005 R08: 0008000000001800 R09: ffffffffffffffff [ 806.994408] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 806.994415] R13: 0000000020000100 R14: 0000000001003000 R15: 0000000020013800 [ 806.994443] [ 807.023708] Invalid ELF header len 9 04:06:07 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7d, 0x7}, 0x2000, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0xff, 0x8, 0x5, 0x80, 0x0, 0x8001, 0x2001, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x9, 0x401}, 0x2, 0x5, 0x7, 0x4, 0x1, 0x8, 0x5, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x8, r0, 0x2) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x8, 0x1, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7fff, 0x8}, 0x80, 0x9, 0x0, 0x1, 0x8001, 0x6, 0x8a81, 0x0, 0x9, 0x0, 0xfffffffffffffffb}, 0x0, 0x3, 0xffffffffffffffff, 0xd7ede9b8d2555a0a) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0xfe, 0x0, 0x30, 0x5, 0x0, 0xb82, 0x29000, 0xf5e5317b6dc5c96d, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x0, 0x6, 0x10000, 0x6, 0x0, 0x7, 0x3, 0x0, 0x7ff, 0x0, 0xc5}, 0xffffffffffffffff, 0xb, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r2 = signalfd4(r1, &(0x7f00000001c0)={[0x9]}, 0x8, 0x80000) fallocate(r2, 0x4, 0x401, 0x3f) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) write(r3, &(0x7f0000000900)="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", 0x200) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x428000, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, &(0x7f0000000200)={{0x0, 0x5, 0xf1f2, 0xb, 0x7, 0x10000, 0x2, 0x84, 0x6, 0x1effe, 0xff, 0x7ff, 0xfffffffffffffffb, 0xfffd, 0x7}}) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000000b00)={r5, 0x10001}) fcntl$setstatus(r3, 0x4, 0x44000) sendfile(r3, r4, 0x0, 0xfdef) r6 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r6, 0x9) finit_module(r6, 0x0, 0x6) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x200000e, 0x1010, r6, 0x20fa3000) 04:06:07 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 04:06:07 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x40, 0x8, 0xff, 0x81, 0x0, 0x8, 0x400e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x401, 0x7}, 0x1081, 0xfffffffffffffffe, 0x401, 0x3, 0x1, 0x9, 0x2, 0x0, 0xfffeffff, 0x0, 0xfffffffffffffffe}, r2, 0xffffffffffffffff, r0, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500, 0x2) 04:06:07 executing program 7: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$dupfd(r0, 0x406, r0) keyctl$chown(0x4, r1, 0xee00, 0xee00) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$chown(0x4, r1, 0x0, 0x0) 04:06:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 11) 04:06:07 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x1000009) finit_module(r1, 0x0, 0x6) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000200)="55bac7a671c8ed6d9a1503988f8d96fefd3c2e237b3be3a731fd0d401f425523dd77bb6534e45d72b1e60450ade5fcdef1fc0100cb374148b6a6ec9b0426455baa54", 0x42, 0x9}, {&(0x7f0000000280)="789a0bd28b145050a981dfc79ba2976f69591a06baabc144d91c560695a918ff447c58f391bfa97cbbdfa6c3e38c514aa683c65b93251df1e46c3039b27a260fa0395176d7265b948060a1f96de5b1c2a9802325cb7829d00f008eec71ba9365f28cde79b64fe07064c2c8b8c4c19713c2251bcf9275404791fb399f72a283", 0x7f}, {&(0x7f00000003c0)="9f0523ee11e329748023dc16ed755a644348f56dc1900501097725ded6fd1577272960109d17961313bb14f372d4bc5e8a579034d274d66040798914b31e4ca00706485cee1d9a530b5b31275615ebb4a539232ef8fcbb0d7c67198a9fd628a434108cb8f032d38ade454b4597563cffd99c60b7d8ce69c09dd541d4f8cd6c2293ce59b3b49e7061216744fca54d8836090254b59c21f7548fc8ca48dbec089420ed2b040c3e035633ae4b565cdf321658f3cabf4fff60351450ca027fac2e511a34e265f4f4e7bceb1a5c9bc6f0c9c893adc5b4e5b5131c72c6a2b26bf979a7851693f749683bfed1d5c9cef177606cbf7c9d", 0xf3, 0x80000001}], 0x208000, &(0x7f0000000540)={[{@uni_xlate}], [{@subj_type={'subj_type', 0x3d, '/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@context={'context', 0x3d, 'user_u'}}]}) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) close_range(r1, r2, 0x2) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) finit_module(r3, 0x0, 0x6) ftruncate(r3, 0x2) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) 04:06:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000b8c5c4d1b3cf4b38ab2e2967fb770ff3010040", 0x1f, 0x3f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d4f4655fd4f4655fd4f4655f0000fff1000004004000000000000800050000000af30100ba", 0x2d, 0x2080}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012f00)) 04:06:07 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r3, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r1, r2, r3}}, 0x71) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)=']\x00', r0) r4 = geteuid() r5 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r7, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r5, r6, r7}}, 0x71) keyctl$chown(0x4, r0, r4, r6) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:07 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x40, 0xc3, 0x4, 0x47, 0x0, 0x7, 0x48151, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0xd8d1, 0xffffffff}, 0x40010, 0x2, 0x8058, 0x4, 0x9, 0x9, 0x6, 0x0, 0x4, 0x0, 0x4}, r1, 0x9, r0, 0x8) syz_genetlink_get_family_id$ieee802154(0xfffffffffffffffd, 0xffffffffffffffff) [ 815.250005] Invalid ELF header len 9 [ 815.256902] Invalid ELF header len 9 04:06:07 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="0c81869fa67aecdc6f8aab318f649504984dc76b7853afe67a5746da8017cdf253a8ec54c744b6ae63fdaee86d9e3f7a15ced584d931400dff80be47fb9ee3518c55b2", 0x43, 0xfffffffffffffffa) keyctl$chown(0x4, r0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100), 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/255, 0xff}, {&(0x7f00000003c0)=""/199, 0xc7}, {&(0x7f00000004c0)=""/112, 0x70}, {&(0x7f0000000540)=""/86, 0x56}, {&(0x7f0000000300)=""/24, 0x18}], 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000038000000000200000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x58}, 0x10000) keyctl$chown(0x4, r0, 0xffffffffffffffff, r1) 04:06:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 12) 04:06:07 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x100000) lseek(r1, 0x0, 0x2) 04:06:07 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) keyctl$chown(0x4, r1, 0xee00, r2) keyctl$chown(0x4, r1, 0x0, 0x0) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='syz', r1) [ 815.323325] FAULT_INJECTION: forcing a failure. [ 815.323325] name failslab, interval 1, probability 0, space 0, times 0 [ 815.324251] CPU: 0 UID: 0 PID: 7488 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 815.324270] Tainted: [W]=WARN [ 815.324274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 815.324282] Call Trace: [ 815.324286] [ 815.324291] dump_stack_lvl+0xfa/0x120 [ 815.324314] should_fail_ex+0x4d7/0x5e0 [ 815.324340] ? security_file_alloc+0x35/0x130 [ 815.324371] should_failslab+0xc2/0x120 [ 815.324384] kmem_cache_alloc_noprof+0x80/0x760 [ 815.324406] ? __create_object+0x59/0x80 [ 815.324429] ? security_file_alloc+0x35/0x130 [ 815.324453] security_file_alloc+0x35/0x130 [ 815.324478] init_file+0x95/0x4c0 [ 815.324494] alloc_empty_file+0x76/0x1e0 [ 815.324510] alloc_file_pseudo+0x12b/0x220 [ 815.324525] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 815.324545] __shmem_file_setup+0x1a8/0x370 [ 815.324561] __do_sys_memfd_create+0x2ce/0xaa0 [ 815.324578] ? ksys_write+0x1a3/0x240 [ 815.324596] ? __pfx___do_sys_memfd_create+0x10/0x10 [ 815.324611] ? irqentry_exit+0xee/0x650 [ 815.324624] ? trace_hardirqs_on_prepare+0xe3/0x110 [ 815.324638] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 815.324658] do_syscall_64+0xbf/0x420 [ 815.324675] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 815.324688] RIP: 0033:0x7f0eb800fb19 [ 815.324697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 815.324709] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 815.324725] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f0eb800fb19 [ 815.324733] RDX: 0000000001003000 RSI: 0000000000000000 RDI: 00007f0eb80690fb [ 815.324740] RBP: 0000000000000005 R08: 0008000000001800 R09: ffffffffffffffff [ 815.324747] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 815.324754] R13: 0000000020000100 R14: 0000000001003000 R15: 0000000020013800 [ 815.324771] 04:06:07 executing program 5: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) bind(r0, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x3, 0x0, {0xa, 0x4e21, 0x6760, @dev={0xfe, 0x80, '\x00', 0x27}}}}, 0x80) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="97829d8a04dc96deab954ef9b5f76a000000000009f4fc4491836529d69c25220853c10000000029fedaea930000"], 0xc) close(r1) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) lstat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) write(r2, &(0x7f0000000900)="5ed0b2ff68d76fb346352b602a2a1295cbe01cb3f64fbed9e7f9bc9be0f300cb97f6a204cc586e45dfb949002f61f8fb969dd435dd0c37c5077e5b10cfeafd75205e215b167323a3b971b0ec98e6c3d4d825cae01271cb35cdd091e4872367f354e0dc81a7e4ac79775bc1dcaafe2f5079da79d1989f1ddce6722fc438a7217526cfe75d53471624d6f091e19a7fb699ea27efa9e0fd1914e7c35f297afd9b9b85ff0ce7a982f4fa0c172ea5f06479eec302f30e5df66273717e028f4ca7d4c5b6bc8a3c3c67f688195f22488a15d9e1f7e5fed3a6c2aba7bc308b0e2c5657f4538f4a3bf9b975bb887a901ab3c85261be3e331b741313e78b5ad63b7b1b378e9c79dc4a95b2b4d15cd1d1b808844378f882a72af1e5b0eefd356e0247246e60643204c3b46183dbe4e066c55cb1dcdaa7b70ef43ab2fa4d2b8c4c1a89cb0e325fd9716874d3856cf368efd1f92d21214e55e4de647c37c71887d11f74f9afe1616e3054ceae601e4b3555e243c1882ad42c7730caeb309e7714ad87c55e9fba308cfc4161e562abde3ac4f3d7e0a3584d4928100197f102307c05c0b4b4898b0591bc1433af443478979f28e6136ffb21aaeac2be5490475a08e96bb94fd9d9d3aa2f8a1e147a80ba9bfd04dac3f476ff128476c693ea71f7be47a508c98eddc479eb703d6f17cc5be2182f7c39b0a47eb23e0808b5d87dd2a9ce88eb48a601", 0x200) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="28080000f70300012bbd7000fddbdf000000070000002e2f66696c65312e2f66696c65310000f1972ea0789db6c29bdd81cf79151eb50878901ba600ae5b189c657f54f05c830e2be69764930db0e210033d204a49b05a6c4122d96c575312fe8f5812e074d45155eebef119d97090a91d7712a834"], 0x28}, 0x1, 0x0, 0x0, 0x4004080}, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x44000) sendfile(r2, r3, 0x0, 0xfdef) 04:06:07 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) [ 815.386714] Invalid ELF header len 9 04:06:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$RTC_VL_CLR(r2, 0x7014) listen(0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x4300) socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) r4 = pidfd_getfd(r2, r3, 0x0) ioctl$SG_GET_NUM_WAITING(r4, 0x227d, &(0x7f0000000040)) connect$unix(0xffffffffffffffff, 0x0, 0x0) 04:06:07 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) [ 815.406103] Invalid ELF header len 9 04:06:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 13) 04:06:07 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "2f76709f737e4a90baaff7a9da56da0fd8dfcd99406eef7e4abccc75a2c4df9816bf304097c7b15f95fad389fd3c69f82abf53657f1480dab94f8a3b0aa687ff", 0x3c}, 0x48, r0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r2, 0x0) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) finit_module(r3, 0x0, 0x6) fcntl$getownex(r3, 0x10, &(0x7f0000000100)) keyctl$chown(0x4, r1, r2, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:16 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x202) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "b6d62c3882a2af37944e55d71f97ae4433b7f3b679ce5ffb56715709dd9fca1f175937468f772202587171a852fdf533acc2ab07c3960e3971769001b5df32dd", 0x36}, 0x48, r1) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 14) 04:06:16 executing program 4: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5f0b373726a51ace44b55e1870fab623315e704c609c9025acbffea372213d4300f21c0f2da9b4952ab6a2008462b4703e484557748aa12da310c06cd67714bbd5b3b31b114d61389cbc14d68842f520e3c5881e1b33540305d935897dadd21ff85b3c4ed39faea925993e338aa5807174b0c4b9a30d032f28a711c4781531f3c39ec039b0a1226339d3cab2d9794f0cd7b3e7f2fad4ed44a7f8aabd7720933c471c6ba4c045b9679e82ab30c9254f6ea78322f03945e28a4c5c2e714c58911438f86acd8cb89c12f4ee3bff86861880934e8c1dad41ae7fec5c3c9c151d807eb1213668dbc1f263d760b5495430277e752eab68dde959", 0xf7}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000100)="2eca1383e70651e2763cdc", 0xb}], 0x3, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:16 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:16 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) 04:06:16 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xeekm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8\x00\x00\x00\x00\x00\x00\x00\x00', 0x5) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 04:06:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x82000, 0x0) ioctl$TIOCGPKT(r0, 0x540f, &(0x7f0000004040)) 04:06:16 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x5f, 0xe9, 0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getpgrp(0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000002c0)={0x1, {{0x2, 0x0, @multicast2}}}, 0x88) dup(0xffffffffffffffff) [ 824.386532] FAULT_INJECTION: forcing a failure. [ 824.386532] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 824.389447] CPU: 0 UID: 0 PID: 7537 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 824.389481] Tainted: [W]=WARN [ 824.389489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 824.389501] Call Trace: [ 824.389509] [ 824.389517] dump_stack_lvl+0xfa/0x120 [ 824.389553] should_fail_ex+0x4d7/0x5e0 [ 824.389593] should_fail_alloc_page+0xe0/0x110 [ 824.389619] prepare_alloc_pages+0x1eb/0x550 [ 824.389641] ? __pfx_perf_trace_lock+0x10/0x10 [ 824.389677] __alloc_frozen_pages_noprof+0x17f/0x2000 [ 824.389708] ? __is_insn_slot_addr+0x2e/0x290 [ 824.389742] ? __is_insn_slot_addr+0x136/0x290 [ 824.389764] ? lock_release+0xc8/0x270 [ 824.389793] ? 0xffffffffa0000000 [ 824.389812] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 824.389846] ? perf_trace_lock+0xb5/0x5d0 [ 824.389878] ? __pfx_perf_trace_lock+0x10/0x10 [ 824.389905] ? lock_is_held_type+0x9e/0x120 [ 824.389933] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 824.389966] ? policy_nodemask+0xeb/0x4e0 [ 824.389998] alloc_pages_mpol+0xed/0x340 [ 824.390026] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 824.390052] ? filemap_get_entry+0x1bb/0x3b0 [ 824.390080] ? __pfx_filemap_get_entry+0x10/0x10 [ 824.390115] folio_alloc_mpol_noprof+0x38/0x2a0 [ 824.390150] shmem_alloc_folio+0x11b/0x140 04:06:16 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) keyctl$chown(0x4, 0x0, 0xee00, 0xee00) keyctl$chown(0x4, 0x0, 0x0, 0x0) [ 824.390175] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0 [ 824.390209] ? find_held_lock+0x2b/0x80 [ 824.390244] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 824.390270] ? __lock_acquire+0x451/0x2250 [ 824.390297] ? __pfx_perf_trace_lock+0x10/0x10 [ 824.390322] ? simple_xattr_get+0x173/0x1d0 [ 824.390354] shmem_write_begin+0x194/0x3b0 [ 824.390382] ? __pfx_shmem_write_begin+0x10/0x10 [ 824.390406] ? mark_held_locks+0x49/0x80 [ 824.390430] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 824.390462] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 824.390485] ? ktime_get_coarse_real_ts64_mg+0x213/0x2a0 [ 824.390521] generic_perform_write+0x391/0x810 [ 824.390557] ? __pfx_generic_perform_write+0x10/0x10 [ 824.390586] ? file_update_time_flags+0x24c/0x4f0 [ 824.390617] shmem_file_write_iter+0x111/0x140 [ 824.390656] vfs_write+0xbe9/0x1150 [ 824.390690] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 824.390711] ? __fget_files+0x34/0x3b0 [ 824.390743] ? __pfx_vfs_write+0x10/0x10 [ 824.390801] __x64_sys_pwrite64+0x1f1/0x260 [ 824.390836] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 824.390882] do_syscall_64+0xbf/0x420 [ 824.390911] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 824.390933] RIP: 0033:0x7f0eb7fc2ab7 [ 824.390949] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 824.390969] RSP: 002b:00007f0eb5584f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 824.390990] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb7fc2ab7 04:06:16 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x9, 0xc6811, r1, 0x98cb000) pread64(r0, &(0x7f0000000000)=""/114, 0x72, 0xcfb) clone3(&(0x7f0000000500)={0x8a90ff00, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 824.391004] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 824.391017] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 824.391030] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 824.391043] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 824.391075] 04:06:16 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x7a, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x1}, 0x100, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0xfffffff9}, 0x0, 0x3, r0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) inotify_add_watch(r1, &(0x7f0000000280)='./file0\x00', 0x40) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x0) 04:06:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffdfff, 0xffffffffffffffff, 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @private}, &(0x7f0000000180)=0x10) fcntl$setstatus(r0, 0x4, 0x44400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x1ff) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) write(r1, &(0x7f0000000900)="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", 0x200) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x44000) sendfile(r1, r2, 0x0, 0xfdef) 04:06:16 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) r2 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="3f7c91477c09ddd14a33189c3704448d2debdfc9ec07a1afb1a7a1e3bdeea5a5722f41ea852d7532d5a7721965907c6475f4f2cba06e7eab384fdb398e78617b886c1eb864c3da40f733801519df0c8e2cb03713e32be0b3d4f618f05b20712d767e01fd5ec8b80cb0dfa858547cb9c936124e3d8429420daa3326413b96369acc14a0e0bcb38a5002db2464053a5a8f482b8f785167e7b8e6abf6b97f6e5dfc9cdf5795bf1ed5fe721d999b29da5c50bd95104894416566424cbd69", 0xbc, r1) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r2, 0xc, 0xbe}, &(0x7f0000000200)=ANY=[@ANYBLOB='enc=ra*sh=mcryptd(sha224-arm64\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00'], &(0x7f0000000280)="1c6ae3f77cd5c789ced7b624", &(0x7f00000003c0)=""/190) keyctl$chown(0x4, r1, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000300)={r3, 0x3f, 0xa6}, &(0x7f0000000500)={'enc=', 'raw', ' hash=', {'rmd256\x00'}}, &(0x7f0000000580)="307197cd544c23b6b020c7fb7d328153af21daee7e25c768b0c029106ee3c9f774b4e14b04e9d4048550d42917f7ed7b3a8c642e7e00bd517fd2a0ab356f97", &(0x7f00000005c0)=""/166) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x1, 0x6, 0x2, 0x6, 0x0, 0x38, 0x0, 0x7, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000002c0)}, 0x40000, 0xfffffffffffffffe, 0x3, 0x0, 0x3, 0x2, 0x25f, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x3, r0, 0x0) [ 824.524359] Invalid ELF header len 9 04:06:16 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = getegid() keyctl$chown(0x4, r0, 0xee00, r1) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:16 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) fcntl$addseals(r0, 0x409, 0xd) 04:06:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 15) 04:06:16 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x100000000}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa34}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) fcntl$addseals(r2, 0x409, 0x4) r3 = syz_open_dev$loop(&(0x7f0000000580), 0x400, 0x80000) finit_module(r3, &(0x7f00000005c0)='io.max\x00', 0x2) finit_module(r1, 0x0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x80010, r1, 0xed927000) r4 = syz_open_dev$hiddev(&(0x7f0000000040), 0x7f, 0x2800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000480)={0x0, 0x0}) r7 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r9 = dup3(r7, r8, 0x0) getsockopt$packet_buf(r9, 0x107, 0x6, 0x0, &(0x7f0000000440)) clone3(&(0x7f0000000500)={0x200000000, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), {0x27}, &(0x7f00000003c0)=""/94, 0x5e, &(0x7f0000000300)=""/38, &(0x7f00000004c0)=[0xffffffffffffffff, r5, r6], 0x3, {r9}}, 0x58) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000200)) 04:06:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7ff, 0x20000000000800}, 0x10000, 0x2, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0xfff, &(0x7f0000000040)) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0x0, 0x80, 0x0, 0x5}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x8b) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000400)="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", 0xbfe, 0xffffffffffffffff, 0x0, 0x2}]) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002200), 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ftruncate(0xffffffffffffffff, 0x9) finit_module(0xffffffffffffffff, 0x0, 0x6) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x80, 0x8000, 0xffffffff, 0x3ff}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="000900000065293f78f03000000000"]) [ 824.701186] Invalid ELF header len 9 [ 824.707998] FAULT_INJECTION: forcing a failure. [ 824.707998] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 824.709759] CPU: 0 UID: 0 PID: 7573 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 824.709793] Tainted: [W]=WARN [ 824.709800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 824.709813] Call Trace: [ 824.709822] [ 824.709830] dump_stack_lvl+0xfa/0x120 [ 824.709864] should_fail_ex+0x4d7/0x5e0 [ 824.709905] should_fail_alloc_page+0xe0/0x110 [ 824.709930] prepare_alloc_pages+0x1eb/0x550 [ 824.709952] ? __pfx_perf_trace_lock+0x10/0x10 [ 824.709985] __alloc_frozen_pages_noprof+0x17f/0x2000 [ 824.710014] ? __is_insn_slot_addr+0x2e/0x290 [ 824.710040] ? __is_insn_slot_addr+0x136/0x290 [ 824.710062] ? lock_release+0xc8/0x270 [ 824.710089] ? 0xffffffffa0000000 [ 824.710108] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 824.710140] ? perf_trace_lock+0xb5/0x5d0 [ 824.710171] ? __pfx_perf_trace_lock+0x10/0x10 [ 824.710197] ? lock_is_held_type+0x9e/0x120 [ 824.710225] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 824.710258] ? policy_nodemask+0xeb/0x4e0 [ 824.710290] alloc_pages_mpol+0xed/0x340 [ 824.710319] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 824.710344] ? filemap_get_entry+0x1bb/0x3b0 [ 824.710373] ? __pfx_filemap_get_entry+0x10/0x10 [ 824.710408] folio_alloc_mpol_noprof+0x38/0x2a0 [ 824.710444] shmem_alloc_folio+0x11b/0x140 [ 824.710469] shmem_get_folio_gfp.constprop.0+0x4ea/0x13a0 [ 824.710504] ? find_held_lock+0x2b/0x80 [ 824.710539] ? __pfx_shmem_get_folio_gfp.constprop.0+0x10/0x10 [ 824.710565] ? __lock_acquire+0x451/0x2250 [ 824.710592] ? __pfx_perf_trace_lock+0x10/0x10 [ 824.710617] ? simple_xattr_get+0x173/0x1d0 [ 824.710663] shmem_write_begin+0x194/0x3b0 [ 824.710692] ? __pfx_shmem_write_begin+0x10/0x10 [ 824.710716] ? mark_held_locks+0x49/0x80 [ 824.710746] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 824.710778] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 824.710801] ? ktime_get_coarse_real_ts64_mg+0x213/0x2a0 [ 824.710837] generic_perform_write+0x391/0x810 [ 824.710873] ? __pfx_generic_perform_write+0x10/0x10 [ 824.710902] ? file_update_time_flags+0x24c/0x4f0 [ 824.710933] shmem_file_write_iter+0x111/0x140 [ 824.710958] vfs_write+0xbe9/0x1150 [ 824.710992] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 824.711013] ? __fget_files+0x34/0x3b0 [ 824.711046] ? __pfx_vfs_write+0x10/0x10 [ 824.711103] __x64_sys_pwrite64+0x1f1/0x260 [ 824.711139] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 824.711184] do_syscall_64+0xbf/0x420 [ 824.711214] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 824.711236] RIP: 0033:0x7f0eb7fc2ab7 [ 824.711252] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 824.711272] RSP: 002b:00007f0eb5584f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 824.711293] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb7fc2ab7 [ 824.711308] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 824.711321] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 824.711334] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 824.711347] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 824.711379] 04:06:26 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)=@keyring={'key_or_keyring:', r0}) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:26 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='hybla\x00', 0x6) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r3, 0x89fa, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', r4, 0x29, 0x81, 0x2, 0x4, 0x8, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x7, 0xfff}}) 04:06:26 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x5, 0x0, 0x49, 0x80, 0x0, 0x3, 0x790c0, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x1, @perf_config_ext={0x8001, 0x36a80000}, 0x2, 0x7, 0x9, 0x0, 0x7f, 0x4, 0x3ff, 0x0, 0x401, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0xa) r1 = memfd_create(&(0x7f00000003c0)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x1) close_range(r1, r0, 0x2) signalfd4(r1, &(0x7f0000000000)={[0x1]}, 0x8, 0x80800) close_range(r1, r1, 0x2) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x0) 04:06:26 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = getpid() setpriority(0x0, r2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r1, 0xee00, r3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x9, 0x9, 0xe1, 0x63, 0x0, 0xf3, 0x800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x40000, 0x1000000000000, 0xfff, 0x5, 0x200, 0x4, 0x6, 0x0, 0x9, 0x0, 0x80000007}, 0xffffffffffffffff, 0x1, r0, 0xa) 04:06:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 16) 04:06:26 executing program 3: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 04:06:26 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r2, r2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r2}}, './file0\x00'}) [ 834.326414] FAULT_INJECTION: forcing a failure. [ 834.326414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 834.327548] CPU: 1 UID: 0 PID: 7595 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 834.327567] Tainted: [W]=WARN [ 834.327571] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 834.327579] Call Trace: [ 834.327583] [ 834.327588] dump_stack_lvl+0xfa/0x120 [ 834.327610] should_fail_ex+0x4d7/0x5e0 [ 834.327628] ? page_copy_sane+0xce/0x2b0 [ 834.327649] copy_folio_from_iter_atomic+0x383/0x1820 [ 834.327677] ? __pfx_perf_trace_lock+0x10/0x10 [ 834.327701] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 834.327726] ? shmem_write_begin+0x1ab/0x3b0 [ 834.327747] ? __pfx_shmem_write_begin+0x10/0x10 [ 834.327764] ? mark_held_locks+0x49/0x80 [ 834.327781] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 834.327806] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 834.327820] ? ktime_get_coarse_real_ts64_mg+0x213/0x2a0 [ 834.327848] generic_perform_write+0x1d7/0x810 [ 834.327869] ? __pfx_generic_perform_write+0x10/0x10 [ 834.327885] ? file_update_time_flags+0x24c/0x4f0 [ 834.327905] shmem_file_write_iter+0x111/0x140 [ 834.327918] vfs_write+0xbe9/0x1150 [ 834.327938] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 834.327949] ? __fget_files+0x34/0x3b0 [ 834.327967] ? __pfx_vfs_write+0x10/0x10 [ 834.327998] __x64_sys_pwrite64+0x1f1/0x260 [ 834.328016] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 834.328041] do_syscall_64+0xbf/0x420 [ 834.328058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 834.328070] RIP: 0033:0x7f0eb7fc2ab7 [ 834.328079] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 834.328091] RSP: 002b:00007f0eb5584f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 834.328103] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb7fc2ab7 [ 834.328110] RDX: 000000000000001f RSI: 0000000020000040 RDI: 0000000000000004 [ 834.328118] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 834.328125] R10: 00000000000004e0 R11: 0000000000000293 R12: 0000000000000004 [ 834.328132] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 834.328149] [ 834.354797] loop0: detected capacity change from 0 to 32792 [ 834.368419] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 834.370106] EXT4-fs (loop0): get root inode failed [ 834.370510] EXT4-fs (loop0): mount failed 04:06:35 executing program 5: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r0}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e8000000", @ANYRES16=0x0, @ANYBLOB="01002cb57000fddbdf256000000008000300", @ANYRES32=r0], 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0xc000) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002b80)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000229bd7000fddbdf251400000008000300", @ANYRES32=r0, @ANYBLOB="0c009900010000004a00000034008100050002000800010005000100050000000500020004000000050001002000000005000100080000000500020081000000"], 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000044) r2 = dup(0xffffffffffffffff) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r3, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc4, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x20008000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r2, 0x0) pwritev2(r1, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x0, 0x0, 0x0) 04:06:35 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x20000000, &(0x7f0000000000)='./file1\x00', 0x0, 0x200400, 0x0) 04:06:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 17) 04:06:35 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = eventfd2(0xf7, 0x800) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x10000, 0x3f, 0xa000, 0x6, 0x2, 0x8}) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) 04:06:35 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0xee00) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) keyctl$chown(0x4, r1, 0xffffffffffffffff, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x3, 0x6, 0x9, 0xf8, 0x0, 0x1, 0x24108, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0xfffffffffffffffe, 0x1d3}, 0x8013, 0x4e, 0x0, 0x2, 0x81, 0x10000, 0xf801, 0x0, 0xbd2d, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x9) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000080)={r2, 0x44, 0xb3}, &(0x7f0000000440)=ANY=[@ANYBLOB="656e633d706b63733120686173683d7368613338342d61767800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000093799b8690afd1de7e6732bbcb752f1e2971415cbeddc3bfe0a23d4ca0bda889151c0f5623bf345a3c3c596c80f99dfda8bcf5e02198f202f0ae3da61bd9f4d7e51f21f0"], &(0x7f0000000200)="f9b60a418c53e0a745eca40b7a4162da3c3b262f9b3d6181be69121ad45fead453d41c6f8e5084bbaff62db09124e3cfc755e25c4d506ecc13c8f98aaa972c5bf791f7ee", &(0x7f0000000280)="afa5ab93e429db0bb3dec94f8d5fbd86a30f17716129e1b7e70d36abdd36e612fcf120cf431067c7a4ff505ccb7de42d08d8020430db818f5d4d1195490e9f691ba3a83bdd6730626e13f56997a532d159517f53b6d67a2516f1f88b19eaf04d972103745a244575c40e54fca8fa8abfdf8fd259504e01dd55975575f450caf97f790c10561e8d3ba95e05d8e269b99f39163337fde2e731a9dfb2db13491fdeecb35d19c38fc0716f8ccadd16baaabdf1bfe3") keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:35 executing program 2: r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={0x0, @xdp={0x2c, 0x0, 0x0, 0x34}, @in={0x2, 0x4e24, @empty}, @llc={0x1a, 0xffff, 0x1, 0xff, 0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x10000000007f, 0x2}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x3}}, 0x0, r4}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000180)={'syztnl1\x00', r4, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, 0x0, 0x20}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000740)=0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000240)=ANY=[@ANYBLOB="dc0100001800000125bd7000fedbdf25000000000000000000000000000000000a0101020000000000000000000000004e2404014e2300000000000000000000005232c5631a1d434f42f8ca5776bd6687aacaf5d7eb633396643b56b9bf4c6651c3acf092efcc9e6878d11a5d78", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0a010100000000000000000000000000000004d33300000064010100000000000000000000000000c5ffffffffffffff05000000000000000104000000000000210000000000000000000000000000004000000000000000030000000000000000fcffffffffffff0104000000000000d10200000000000009000000000000000800000000000000000800bb0200000002000027bd70000740bf49916e7bb313eb5f1b3500000a0006060200000000000000b500000000000000e4000600fe800000000000000000000000000037000000000000000000000000000000004e20009b4e23", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="ac1414aa000000000000000000000000000004d46c00000000000000000000000000000000000000dd0e0000000000004d0000000000000000010000000000000200000000000000060000000000000005000000000000001f00000000000000000005000000000000005f9300000000000008000000000000002000000007000000500f000028bd700007350000060002d64700"/168], 0x1dc}, 0x1, 0x0, 0x0, 0x4000011}, 0x40084) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ll={0x11, 0xf5, r1, 0x1, 0x4, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xf}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000200)="f367f041c470da6da401aca4a15f7894e27eba90d9e338f4d5f3c06f888f264896603bdb69b8", 0x26}], 0x1, &(0x7f0000000480)=ANY=[@ANYRES32=r5], 0x3d0}, 0x0, 0x8000000, 0x1, {0x0, r6}}, 0x6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd, 0x0, 0x0, 0x9c, 0x5, 0x0, {0x0, r6}}, 0x3000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_FSYNC={0x3, 0x4, 0x0, @fd_index=0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3f) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd=r0, 0x3ff, 0x0, 0x80, 0x0, 0x1, {0x0, r6}}, 0x8) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r7, 0x9) finit_module(r7, 0x0, 0x6) 04:06:35 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) keyctl$chown(0x4, r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000010000002900000071d99a28018582fc7cd1f3893e73b2ccf52ae11416e4adc71d320b99d2a9539493a2ecffd5c5dd436c13a0b9c75df47e15d5adb1e28b432ed375cc184b18940dcae806bf0e", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="2257770797c77b5805b29787f7a961d3de2868d30cd1ab859d"]) keyctl$chown(0x4, r2, r3, 0xffffffffffffffff) [ 842.939406] FAULT_INJECTION: forcing a failure. [ 842.939406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 842.940396] CPU: 1 UID: 0 PID: 7630 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 842.940416] Tainted: [W]=WARN [ 842.940420] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 842.940428] Call Trace: [ 842.940432] [ 842.940437] dump_stack_lvl+0xfa/0x120 [ 842.940462] should_fail_ex+0x4d7/0x5e0 [ 842.940487] ? page_copy_sane+0xce/0x2b0 [ 842.940510] copy_folio_from_iter_atomic+0x383/0x1820 [ 842.940537] ? __pfx_perf_trace_lock+0x10/0x10 [ 842.940561] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 842.940583] ? shmem_write_begin+0x1ab/0x3b0 [ 842.940604] ? __pfx_shmem_write_begin+0x10/0x10 [ 842.940618] ? mark_held_locks+0x49/0x80 [ 842.940635] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 842.940658] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 842.940671] ? ktime_get_coarse_real_ts64_mg+0x213/0x2a0 [ 842.940692] generic_perform_write+0x1d7/0x810 [ 842.940712] ? __pfx_generic_perform_write+0x10/0x10 [ 842.940732] ? file_update_time_flags+0x24c/0x4f0 [ 842.940750] shmem_file_write_iter+0x111/0x140 [ 842.940764] vfs_write+0xbe9/0x1150 [ 842.940785] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 842.940797] ? __fget_files+0x34/0x3b0 [ 842.940814] ? __pfx_vfs_write+0x10/0x10 [ 842.940845] __x64_sys_pwrite64+0x1f1/0x260 [ 842.940864] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 842.940889] do_syscall_64+0xbf/0x420 [ 842.940906] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 842.940919] RIP: 0033:0x7f0eb7fc2ab7 [ 842.940928] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 842.940939] RSP: 002b:00007f0eb5584f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 842.940951] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb7fc2ab7 [ 842.940959] RDX: 000000000000009c RSI: 0000000020000140 RDI: 0000000000000004 [ 842.940966] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 842.940973] R10: 0000000000000640 R11: 0000000000000293 R12: 0000000000000004 [ 842.940980] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 842.940998] [ 842.966502] Invalid ELF header len 9 [ 842.986417] Invalid ELF header len 9 04:06:35 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @mcast2, 0x400003}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000002000)=[{{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000540)="ae98d7aa", 0x4}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x1) 04:06:35 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000200)={r1, 0x44, 0xc1}, &(0x7f0000000240)={'enc=', 'pkcs1', ' hash=', {'sha512-ce\x00'}}, &(0x7f00000002c0)="0129e81020b21b9360a6d58c8f3f75d5d93992039af0f2290a33637dade2980a56e3bf297a54a36598a82ab898e2d0b2824d3ed5484bd1dbbaabd6019b2ba0e2d96e8a42", &(0x7f00000003c0)=""/193) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "03c5888ea7e950f5c1e78e0b1501a7b5b23a3f29e0f0d1044a1678463f5b83fb9fd48786e91d5074b462c95c884d8f8a5d2c25635d20053cf9fa5e59cdc10b0c", 0x15}, 0x48, r0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) keyctl$negate(0xd, r2, 0x1, r3) [ 843.005734] loop0: detected capacity change from 0 to 32792 [ 843.020306] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 843.022569] EXT4-fs (loop0): get root inode failed [ 843.023103] EXT4-fs (loop0): mount failed 04:06:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7a75cfa2f8406e17) recvmmsg$unix(r0, &(0x7f0000001700)=[{{0x0, 0xfffffffffffffe1c, 0x0, 0x0, 0x0, 0x57}}], 0x572, 0x2342, 0x0) 04:06:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 18) [ 843.082336] FAULT_INJECTION: forcing a failure. [ 843.082336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 843.083337] CPU: 1 UID: 0 PID: 7651 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 843.083356] Tainted: [W]=WARN [ 843.083361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 843.083368] Call Trace: [ 843.083373] [ 843.083377] dump_stack_lvl+0xfa/0x120 [ 843.083402] should_fail_ex+0x4d7/0x5e0 [ 843.083427] ? page_copy_sane+0xce/0x2b0 [ 843.083449] copy_folio_from_iter_atomic+0x383/0x1820 [ 843.083478] ? __pfx_perf_trace_lock+0x10/0x10 [ 843.083502] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 843.083523] ? shmem_write_begin+0x1ab/0x3b0 [ 843.083543] ? __pfx_shmem_write_begin+0x10/0x10 [ 843.083558] ? mark_held_locks+0x49/0x80 [ 843.083575] ? balance_dirty_pages_ratelimited_flags+0x8f/0x1190 [ 843.083599] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 843.083612] ? ktime_get_coarse_real_ts64_mg+0x213/0x2a0 [ 843.083633] generic_perform_write+0x1d7/0x810 [ 843.083653] ? __pfx_generic_perform_write+0x10/0x10 [ 843.083669] ? file_update_time_flags+0x24c/0x4f0 [ 843.083687] shmem_file_write_iter+0x111/0x140 [ 843.083701] vfs_write+0xbe9/0x1150 [ 843.083725] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 843.083736] ? __fget_files+0x34/0x3b0 [ 843.083754] ? __pfx_vfs_write+0x10/0x10 [ 843.083785] __x64_sys_pwrite64+0x1f1/0x260 [ 843.083804] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 843.083829] do_syscall_64+0xbf/0x420 [ 843.083845] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 843.083858] RIP: 0033:0x7f0eb7fc2ab7 [ 843.083868] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 843.083879] RSP: 002b:00007f0eb5584f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 843.083891] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb7fc2ab7 [ 843.083899] RDX: 0000000000000020 RSI: 0000000020010400 RDI: 0000000000000004 [ 843.083906] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 843.083913] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 843.083920] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 843.083937] 04:06:35 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) add_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000003c0)="5408acec0be72ef255783347583f6b4cfcdc34a295502e0afbdd59f3ae4cfb625f1da560bfa01640e099468505e195e62cbe59de995e5df7d375ad96f338f19c02d62936be27584693aca2b3803129708ca6c4668979ab7e5aae1de0766b163007a177e5ae82c7faf691a171c3606a4f94b73330c2185e28f502573e083b97c6b434e969e4aab37ba61faf45699e12068cfaa82a76a8cbd144c9992b9b1b9e704c202d7320ec4fefac79ae93b6ba89d21f6763e6082ca1800dc86d2e77e9", 0xbe, 0xfffffffffffffff8) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000240)={0x0, 0x2, 0x9, 0x4}) ftruncate(r1, 0x9) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000200)='./file0\x00', 0x81, 0x0, &(0x7f0000000240), 0x2044a0, &(0x7f00000003c0)={[{@dots}, {@dots}, {@fat=@debug}, {@dots}], [{@subj_role}, {@smackfstransmute={'smackfstransmute', 0x3d, '/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8'}}]}) vmsplice(r1, &(0x7f0000001980)=[{&(0x7f0000000580)="fada2dbc5a11fd4fafb67532e1095cc3f251edd2a3564b943c88c337e51e98498dc4dd018f3d0ebaeb4ce1ec6c2cb00aefeaddbf8fa457bb69c2b96e6aff72013591ab9e3078ab3a332b75f714faf8cb91dc851c5817f21dca19228cdbe0c5f9c151bd9b081e9f3927ffe522fdcc6d44db8cad64c53aa26f055f59ee6c0e98ab5733c0a9ffb52a5ae2ef352c70345a16903f3cac149a5c9bbe06177833706be53acb62ed739b73dc7b342c01dcb57448407e4117f731079d8b7e5e96be4e1a2032fd3751e874cc2182921bccb3616ab626166b11ca", 0xd5}, {&(0x7f0000000680)="3a3e5f320c4fc469e91c53f5bca2a71970e89bcd70c6e99f74aebaac9dc0e29aaae22d223ef2ca129108b9cfcd55b9cea154fbfe49ae995cfecba12e844605b96f6a71760f1afcc208f62e747ce196eed7ded7255bbce622f401b18033a734d1ffd1c68d7355f76b9b8ae844287ba7bc3a148e89c30783b86df0ac7183c19812c062d07a3f731614f0a7e3c2eef7a9c068b6a17d57573f9496d51835bfb2e0c760a19c597b2092b1246f83d82ce6d0f15a820e10fd9f0dea", 0xb8}, {&(0x7f0000000740)="517b82461c78939f2c595a7cd79082d69f321e03c45dcd15901df50e9dc5fddff4e6f3184b4a92d6e6074863e7dcfa50392843c459aedff917c1cacbd56d9fd33e91f7149c3539406789ad654eb574039ebeae31ae9f98ee44f36226ea8017cb41deb1f33c2c961e7d86e7a7cc1c0968549bf0f5b46ddda23184606fde26d21d2ba5f602d684795cb18f214270f92be44f", 0x91}, {&(0x7f0000000800)="dcddc30cf3287aac3c0d8debf26041219118a21293e7883018165911bc4bf7f79c795ad0042f2923608cddba1bf60ead496548fa062d7ddc7e939aad0683801148c83694b1839c370965dd7a8619398ce5492ced879cefa1cd5874d6a772cd6dcb13418d08862b2a819c022f137c84a13ab413f0780f6fa0427cf3a9c1c926bc7a47ed8bb32752260eb3169f2fb7243ccedd805af171e2eecfef8299e812862c3f4a2fb5d3b2748c3f74895e1673cab3c9b808ce66", 0xb5}, {&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000002c0)="3d2aaa20dae6e7fb53c6652d0cc8c1c77cd46b89dee171614b57914de173194bc95ec26fcd96c940ea9ed49a6fe320b99b2f07cb32acea2f2413f26de2af86bf0ba46fdfcb2aac294ca3e9c5e79573b861eab502676b3e5b68f02adb", 0x5c}, {&(0x7f00000018c0)="61cc6124a26f39e142ff2b04e8083b426d6fe550cde6fad4fa75fab24a01af390d9df975113cabde17f0a30f504cae5a701641a574e5938d494d1fb4d57a3392c1260ece304250929c60ac1980ab7a56de631e6af7d0089d3f53a57aac8d9622e4785d7b55cb5523895f444f06c10d069f5bfe9cffff95e8248f8842cc2c7081e44de11413a7891879906dcca6c45e258662c69fcd8784e15ef046f098fac84989ba5fe090287d292ee02a3d79855da1b30744e2afaa17a22f99fe4db9", 0xbd}], 0x7, 0x4) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000280)) finit_module(r1, 0x0, 0x6) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) finit_module(r0, 0x0, 0x0) 04:06:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept4$packet(r0, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000900)=0x14, 0x800) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000940), &(0x7f0000000980)=0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) dup3(r0, r2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) syz_open_dev$tty1(0xc, 0x4, 0x2) finit_module(r3, 0x0, 0x6) [ 843.142972] loop0: detected capacity change from 0 to 32792 04:06:35 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$KEYCTL_MOVE(0x1e, r0, r0, 0xfffffffffffffffb, 0x0) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "b5f96b6ac84a6b0a028ea3b3779c79130f59f7c50a37a108e8e4ea02e57612340a696fde07387aebbffb9480b520194b56cdbd2b1f1baa8a5a303fcd6d064653", 0x12}, 0x48, 0xffffffffffffffff) r2 = geteuid() lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r4, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="710000007d020000005a00dc04040000001a0000000002000000000000000000001870000000fe000000410000000000000012002f6465762f6c6f6f702d636f6e74726f6c0002002d2f12002f6465762f6c6f6f702d636f6e74726f6c0001000002002823", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4], 0x71) keyctl$chown(0x4, r1, 0xffffffffffffffff, r3) r5 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000200)={'fscrypt:', @desc3}, &(0x7f0000000240)={0x0, "0e906be4e6fb004bb9bd76e59ff5dcb6a5c0ebe2a2cecc9a9a15dab99087c7802d6b3baa20da59c69c80e163baae443606fed0b3e5710b7a5ec522a1486b6bb2", 0x3c}, 0x48, r0) keyctl$link(0x8, r5, r0) [ 843.211673] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 843.223527] EXT4-fs (loop0): get root inode failed [ 843.224592] EXT4-fs (loop0): mount failed [ 843.245874] Invalid ELF header len 9 [ 843.284886] Invalid ELF header len 9 04:06:45 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpid() r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x80, 0x6, 0x4, 0x40, 0x0, 0x4cd, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x9802, 0x6a9c, 0x8, 0x1, 0x3, 0x101, 0xff8e, 0x0, 0x1, 0x0, 0x9}, r0, 0x6, r3, 0x8) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r4, 0xee00, 0xee00) keyctl$chown(0x4, r4, 0x0, 0x0) 04:06:45 executing program 2: r0 = getpgrp(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) gettid() 04:06:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7a75cfa2f8406e17) recvmmsg$unix(r0, &(0x7f0000001700)=[{{0x0, 0xfffffffffffffe1c, 0x0, 0x0, 0x0, 0x57}}], 0x572, 0x2342, 0x0) 04:06:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 19) 04:06:45 executing program 6: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:06:45 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @private2}, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x1010, r0, 0x80011000) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xcd, 0x2, 0x7, 0x3f, 0x0, 0x9eb, 0x40, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp, 0x20, 0x40, 0x80000001, 0x9, 0x5bd, 0x6, 0x90, 0x0, 0x401, 0x0, 0x2}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) add_key$keyring(&(0x7f0000000300), &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$chown(0x4, r2, 0xee00, 0xee00) syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000280)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_WRITE={0x17, 0x3, 0x4007, @fd_index=0x6, 0x4, &(0x7f00000005c0)="9dc4eabcc382b29dca7a2d24f797c1b921788f5e530f8bf4915657975ce990ed15a90af8d8a763b737157114e5d0dc902ce1ae0097ccf77764ba6710ffc3e0f2d293585c9177f33817de7883306ed80afc94f79d09e2f6349e2db8f4e2fcabd0e3ec1ad5dee7100355a78b7f7cadaa515aefecd5d9dc339886d11fce99a246407480397a44be2594c49e20ecb45d539ed09dc4bad002397f2f3c14e354900a743545bf41b81e10393239d6f68011737fbddccde4", 0xb4, 0x2}, 0x4) syz_io_uring_submit(0x0, r4, &(0x7f00000000c0)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd=r1, 0x9, 0x0, 0x1, 0x0, 0x1}, 0x1) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x80, 0x7, 0x5, 0xc8, 0x0, 0x3, 0x2, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffebf9, 0x66}, 0x20, 0x1, 0x4, 0x2, 0x9, 0x1, 0x1, 0x0, 0x1f, 0x0, 0x9}, 0xffffffffffffffff, 0x9, r1, 0x43831473cfc7941) 04:06:45 executing program 5: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r0}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e8000000", @ANYRES16=0x0, @ANYBLOB="01002cb57000fddbdf256000000008000300", @ANYRES32=r0], 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0xc000) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002b80)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000229bd7000fddbdf251400000008000300", @ANYRES32=r0, @ANYBLOB="0c009900010000004a00000034008100050002000800010005000100050000000500020004000000050001002000000005000100080000000500020081000000"], 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000044) r2 = dup(0xffffffffffffffff) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r3, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc4, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x20008000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r2, 0x0) pwritev2(r1, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x0, 0x0, 0x0) 04:06:45 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r1}) finit_module(r1, 0x0, 0x0) [ 853.790274] FAULT_INJECTION: forcing a failure. [ 853.790274] name failslab, interval 1, probability 0, space 0, times 0 [ 853.792614] CPU: 0 UID: 0 PID: 7687 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 853.792660] Tainted: [W]=WARN [ 853.792669] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 853.792686] Call Trace: [ 853.792697] [ 853.792708] dump_stack_lvl+0xfa/0x120 [ 853.792760] should_fail_ex+0x4d7/0x5e0 [ 853.792806] ? getname_flags.part.0+0x48/0x540 [ 853.792840] should_failslab+0xc2/0x120 [ 853.792870] kmem_cache_alloc_noprof+0x80/0x760 [ 853.792924] ? getname_flags.part.0+0x48/0x540 [ 853.792957] getname_flags.part.0+0x48/0x540 [ 853.792997] getname_flags+0x95/0xe0 [ 853.793040] do_sys_openat2+0x9f/0x240 [ 853.793075] ? __pfx_do_sys_openat2+0x10/0x10 [ 853.793131] __x64_sys_openat+0x142/0x200 [ 853.793167] ? __pfx___x64_sys_openat+0x10/0x10 [ 853.793224] do_syscall_64+0xbf/0x420 [ 853.793264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 853.793294] RIP: 0033:0x7f0eb7fc2a04 [ 853.793317] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 853.793344] RSP: 002b:00007f0eb5584ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 853.793373] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb7fc2a04 [ 853.793393] RDX: 0000000000000002 RSI: 00007f0eb5585000 RDI: 00000000ffffff9c [ 853.793411] RBP: 00007f0eb5585000 R08: 0000000000000000 R09: ffffffffffffffff [ 853.793430] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 853.793447] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 853.793490] [ 853.827693] Invalid ELF header len 9 [ 853.835484] Invalid ELF header len 9 04:06:46 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f00000003c0)={0xadc, 0x0, 0x500, 0x70bd29, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x7, 0x37}}}}, [@NL80211_ATTR_CSA_IES={0xabc, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_BEACON={0xa, 0xba, [0xfc, 0x3, 0x3f]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0xc, 0xbb, [0x9, 0x8, 0x1f, 0x101]}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x615, 0x91, "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"}, @NL80211_ATTR_IE_ASSOC_RESP={0x135, 0x80, [@rann={0x7e, 0x15, {{0x1, 0x25}, 0x7, 0x7a, @device_b, 0x7, 0x1f, 0xffffffff}}, @cf={0x4, 0x6, {0x2f, 0xc2, 0xd61a, 0x3ff}}, @fast_bss_trans={0x37, 0x108, {0x3, 0x7, "485ec09849409dc4fe8135a949ae131c", "154f2a66f68c06b3b403b812f35abcbe02afc066eecd8d03709c7926783147db", "4f98de4750044b0a9b05cd4c6cafc5c236b19c2301ceddcc3b37b52d5a700d2c", [{0x2, 0x7, "da69e83a593d7b"}, {0x4, 0x20, "e074df978596d42e62e0fb894f5e03eda9f94948013d948821f16c469ad642a0"}, {0x2, 0x10, "7b6a8b2d1e1bb1219193e2d498eaf4c2"}, {0x1, 0x26, "c333743e55e49fffcde9a936719ca2bf0672836166188391ed09ac2f3bfb0d1ccb405dc71547"}, {0x2, 0x28, "f3218b5f9eb03d6b4f5743c38eeb68ee97ba218f6cd025a0355ab00b3852181b912d9a80067d3c1b"}, {0x2, 0xd, "3cca62016225426176accd416b"}, {0x4, 0x16, "3a9a0fd9024106bec66524576ce115ab51393fb85838"}]}}, @mesh_chsw={0x76, 0x6, {0x0, 0x1, 0x8, 0x9}}]}, @NL80211_ATTR_PROBE_RESP={0x321, 0x91, "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"}], @NL80211_ATTR_CSA_C_OFF_PRESP={0x16, 0xbb, [0x7, 0x1, 0x8000, 0x8, 0x1, 0x3, 0x0, 0x20, 0x5]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0x12, 0xba, [0x8, 0x0, 0x171a, 0x8, 0x7, 0xd2d, 0x6]}]}]}, 0xadc}, 0x1, 0x0, 0x0, 0x20004080}, 0x2000c000) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) 04:06:46 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40582, 0x188) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/71, 0x47}], 0x1) ftruncate(r0, 0x9) 04:06:46 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000002, 0x13, r0, 0xca577000) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x7, 0x80, 0xad, 0x8, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x8000, 0x3, 0x401, 0x9, 0x1, 0x20, 0x8def, 0x0, 0x0, 0x0, 0xcdb}, 0x0, 0x1, 0xffffffffffffffff, 0x2) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) perf_event_open(&(0x7f0000000280)={0xf, 0x80, 0x0, 0x8, 0x2, 0x0, 0x0, 0x1, 0x1010, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x39b2, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x1100, 0x5, 0x4, 0x9, 0x0, 0x31, 0x5, 0x0, 0x12fb, 0x0, 0x6}, 0xffffffffffffffff, 0x6, r0, 0x8) finit_module(r1, 0x0, 0x6) 04:06:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) keyctl$chown(0x4, r2, 0x0, 0x0) 04:06:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 20) 04:06:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_80211_inject_frame(&(0x7f0000000000), &(0x7f0000002300)=@data_frame={@qos_no_ht={{@type10={{0x0, 0x2, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x7}, @random="85ae6c206fef", @device_b, @device_a, {0xf, 0x35}}, {0x7, 0x1, 0x2, 0x0, 0x2}}, {@type11={{0x0, 0x2, 0xd, 0x1, 0x1, 0x1, 0x0, 0x1}, {0x7}, @broadcast, @device_b, @random="2f103a3d15b4", {0xa, 0x4}, @broadcast}, {0x2, 0x0, 0x3, 0x1, 0x3}}}, @a_msdu=[{@device_b, @device_a, 0x7c, "44055d2dd29088f7604cd091b92c7d68a9d7f46c9f48f01dff2d6b6cd81e1eef1645617799467761630274248d21dee315686e44c0f8b995570c6433109c5b23782efa9097e37c860120ae6aec569ea54d6e6bae7cf2b345d574347f7a440d178ec356f6ab1c0661eba112f94b66f97cd7116c22de25b9b71c9fe99f"}, {@broadcast, @broadcast, 0x1000, "7143675f5c5977306aa8e5241912df57bf00868d8e31451c0f60978eb8c49103ff071bad646f14ff1e23109140c1389c082f934ceb4373649deacdc13e2f7dfebec39636b61ccd79c016dfbc252cb4f5c8ccc5fed0010fa6820b3dc7a8a65ca446f84ea72d949f6b61c3feb54bf6646857b078b5b4f82a58c1352fa19777a749b4e15f5d95eddfd81ecc3df91c5a52101e20483d245c0f14fe7386351df1b28bb1b2d0ee2b47f3e41cd948af6da46a3e56120a3795b87dcf56cdf19abaca4370337472959127593ace5a563ad5f6dc3ef87d35732be4b5c51ff223a84497fa559d437c3290213a5d8b78d925b35622e3499f412fa6f97d1a2dea2677ba48500966b21161c954fcce8e8ca1ce5675affb4b1b489c9ce38a6fab533e534bef836a6f4db8179384a576340c42401b0013cc131ecdbfaf18500f8134ea39aebc97e0593f0d7651e6a3e7bf50d30e67c90b67cb4c25afc55f37e8475377c53f7a7f70152e54457f56b07bc7f1fbec584bd38c69171bcad22c7afcad1ecd8392e3535666597cfb8b1c331b1ad504e0cbc5aa13d5f99b985dc08e96aa58385211a9a718558171342a671294e14938db9d1fe1c5c9e0c20b2c40fbdaa34b4f2b41c73274da6132acbb1ba83f4fbcd04a554e8bcb4f8a66fafb7a72d5865499f5157a4a94b63d8392a1fe743dbc7f3ff439fdc34245ba43a99efcf9597c7bd305b55d7de427be1fdd9cecdaed31724b9e1000c0b16c682636eeeb33dfe3f6fbe68f4f2f445357807bad393eade8da4eceeb2f6bef18eb406c5c69f8daf6af505058aac469c2be3ad4219bb96309cc9ae4b685cd03023865c72e6d858c87f841768f2aad7dab33ab82083d90a1912d7891d71ed13e709cbbe277c573bfdb5f7fb4b0e94ed39484c57f39e62b9920bdaf0d45cb7f5b86f9a5683ffe81d105e796430f48c468d76b2f52b52b394eac8a145d7ec59e6fe41b8042363a0e959f1f10e081f9c327bd1888f09fcbac5d9ea2019a21a52f89255217e7a5e5746a757e5e67c2fd9840acafe7fbe7db5390a1c44eb54f688a68b4ff7aa7efb11273b143b55ce6eb8874f516a96ef192e11632c42a41a91f9bd4f632f5b4951abc31bb220d06695470f425dffdb85e482601393a31d0dc6c8d27c188cbab6062fe5ea00c829266e5840933941ed08d97c68452cfd503a67b8d0d0803eee0cd9eb5e74d3043552d068e33b614992f1b2a3c131928c798ec3e25f898f4d0476593ac3bf5cf80c3805a89408c29b44e671d3ba8cb1e9f9bb4c3b562f1614474978af6adcd0bf65ec9dcabd99a9370f64ee2e64021d8f6fe0c1ab090b4fc1bf4b1ed1381a2234f53d7fd36b49d3960ff99e6b6d6869a0b682c55862d3ed9e25a1c19c7597b6b26937d75fc96e2a14da204d9018e3f795e292c6c106d39484845bb7672fee8d9165f5ff681e0ea2633a50f0245f4bcea1e527cc7b05255b822d5afec6c846181ef6c08dc94753529deb1d03e5a0bed8b6d6354f51fc07e8bd9f933d01dad56d330474a26004465441b6daad4a0bbdedf00bb902a28cac3763dbdcd87f0420026d48a61235fb5cb27e18acda88ce75a99ce5455edb8fa9cdd4a881b4f09200a140e56e71b827850186f7d81a4419515439e6cf3ec49a12ccc9610b760f732581c6ef845782c78202c35651051ee007968efade397e0ae12005a9e64d46f6d39624f8528b9975bc35f7f2432428fa5ae1ab42772a93ca751591cd7c40da69135064ebb527a281ab103581c4048b2e8162b786b5ffdd0829088098ca185aa0676d6bc6d72f0d4e7d9689afe70f5c51e88fd379525fd6666fb6a686adf1d97e413cdcba04c3fee6e6adda9c1a15c4a0a26631b11123865b9c84d10849645a9cf894cf32f60ec35cc706687c1d58660bf71a4887fafd58fb443dfeb0a1ebd4851fe933ce7a7189f1ee16de52e4fae9d22072b677eaafcf756e7c1dc77a589d94709679f38a8c6e1ddda9995a9d14150435a3ce5ebc2754344011cc4d0df7f02e1a197d6055278f57d354a9d24a77ee44a012d201573d386357c0e0c0304c6383c30bdbd1cb371cb96c3ab2f76c8a0e7889501fa3bc34eb2304f93a7e4b7df7d84742fde3581fbe9c9d005a883f500b571b0d5a2037f07dc1a7cf578efa737f580f30d8942480bd66b16017f586f87c6cbdf6cd4c988228089e4f45d4ceb84766742d8510f925cb2049f5c69015096f31e7f1f35f7f6d26d2d474c37c6db69b5c5754df698870ecf485a15ef145d97d3e949e875209b715a6e14b8ac4338478549988803e77631b579db7784fa0d64b1043c1de5b8ae586bf4d60343951bbb33ffa4f797705a3e712d7fc672adb6ff95c6d276cbf42ec7876069b393c879efeea6168b832f11c3b9a8891c8a6ea57f3ae0c1a253662f7a42b9f373076bac98c1e470d6b88139d288525d5d99daab90ad93d6ff11130a6c6c67730e344ac5d2c1f29da458e25746c70349bf112888f87493c8139bd121cb9d1596671560e3ec320d8e1ecde77cac80fd46b15b884196376fe8e2bb6dda28b9e96b709fe32cdef5002e2ff1fd83207e44e96319908e7a292582f7ffc4b8cf03035dbb342e0ff7282824cedb87721fed1e31a069780e8e51ccf1eeb85696579160d064a29199079e49bf0656e710705834d7aeb61c38fd650d46cf1d29e5dc97b1e343e16418a448c5d107be31f89dc6d5d17fc5e4f165c65a62c009aaa9bff73a7a8f4a09f25fce1e13c5a52be16394f7c7f075684fdaae604a9e0a3305a178fc877527a82bedd13973fd89fa7fce982326d8a2571949bbc910d854627d312870143ad53e6485d7b6fb7537badaec4a460109b7068b16151b2e828f1b589a8ac8200d90f0a88ada162b9e18ee491648d360338bbddec836343bae3340bb03e1fc0b53b5604f79d2672da6fe6fdea5bf7c949ae7688414678b01296ab44c3650ced89147d06f0cfe9e54602c80bfa198d308063f292fc468d8fec7d25a8f4e396914aa8f10b0040e44da7a3101616dc3a7614fbd111960d37eb594cfde0a91fa3d2835fba1a1af65a7e697deb08597e1360d4d4532fa0bc2c8e407feb40365cb0e220945a04da72b3ca7595990b97808524f6aa4a7a1c648180788e5409d3bd2a8b07334adafd52347e84e868164ba1a53730c70340cddf10d5659b53852eac26f27696ebd134d495fc0a748aea0ef5ea83686e78b3df94caa2cc6696682624cb3fa94d230f57abc2ca6b2b2a1de124213e4aa7c3570e26b9bb87f0547688cd03c46689e37569fada70bf32f6c1344553e5aa52e61f0fc0da8663eb909db4b0d328bc9e4ad3b4506042f5a0cc1fb13399a8ee9b9d0c9e49fc7b1f0324d4c5db72f3b1e66231662d2f7f7cbaf4e06104c801b7033d0a6e774f72795e80b291b562e180033e9f00e6002ada79253ff88d6e3a141c6891ccad4e89fe55b977f889b3ff2427c54292234e797bf8f70d3f083fdae8b81542f9e731c2b60afefe84ad8d9b7f2fc3eaf3f10081e5d70f6b1f66faa5767906cab15e26a1605786c5dfb6cfe97557188d855a2c314148aadd619c094efec4e5f23d9a7ac1fca52f16e9829d9388090daeb0c185f70d1f24bca165a14a470fd210aa4da07cbb1e6b742560fca890c53a822421cdf984279841501aff615e8bfb8811168bd7f5f56ad9d3bb469782fe492e6c8b2081e9ef994f525920e3b42cf70c350613587bf75645b86dc59a71eda625aa3facb66c9de7c6495301863c6dc44eb4d970ea52b0b6a51e80c58d4d0d0824a794fa19d2604c7b1e898ebc9ff69b8fe5799622b185cde894f56af74e91235961b692948cb661b39185ca445326bab1992fb33ae691a1fbf0d5a98a73e9c31593ee34e975d61115cabf239297403159e82bdc69dee3b7a88ab3398e05209311c11bdc902f5b5fd043f327a4bdc876c949a1e87cb13c98e13a128e29d348d9b064e164e06785b0b6977ea7944dc2831a033251fe756128f869dbe0a87d81dacf72eebc35651324a725daa83d6f9405f85144f72384d7bcc6fd871d76083a6d305cb712965c70ef79dfce4eaf060bb218c3273decf88047bf641d88da30d72c5eb7f7d08e8396053769e9ac10424534b45c63eb34a6b11470834d2778102fe32e499f4a202d5981eaea72767fd0231c07e5822b6e0572fdf12bf1b23b4adaca4fd055bc8bc37d957f2c3eae4982eb9dc1936e21a197b19b279f04797c3ab55820eec89f2fe5db8202f0b8e7508db0f4319cd350ae37f688a2cb2d90a3a5c5ef323ff856b6d30413a025f8ed4daa6dc25fcf0f95cae5e8c35869f7e24bcc731b08fc982b5475a849d7f969fd66e1f89bc3a7a6b41aeb56843564250a16b401bd770b13c437c584dc385f64715711745c9c2da9802c8cebd9046de5b41d8488118b528d86487c3fb51e6306c60c3aee2caacad7790f4b7b97d8fc6d61c6b803aa62ea491e3b0c1d3ce9150557dfda02f7c69c68748bacef0a3aa866823cd57cc758d61a5d7f6c4f02748b82be76040ba80444d5673015883355a62109f97e194178931604055d9eb2405a4ce5665841e6ff55f3ae388319c35ddce1c91027390147f140149e4f7f77d48a909ab5e9ff041cfa5fa2f1d0ac709083c636245d85d5abc686ed330e8461a73c49da20aa3155c4bbd61b083c90fcb8a590e03beecdc724065194227147ac64ee343c45628734b428afc301f617943aad92f47150b50e2fa1ec8039f10c7c4ef497b79156f56b95a2e77da32b8d3d66eb98e28677a4861da7fa39af87eccc1cf7858a71e5fb415b3d4afa37850520ef30e130a94504ae819c3fc7d094fc323f47a401af994b1dbda53c3783ac3515a6b4f5bdd561b4d26ab5489dd99ec19620054093f1c0db6528adcd3dd2471906000ba8f8b6a0613c04bb577bb3b105020323f4d010052032149fc0f2fc95954e166de327164d74a0aef7267221ce88513d4788f20b655bed5dabec74cb4f63effb21a208aad5dd2d5dac347fc04b52976b130a361647799dcb2df1f4f2a5fc859d98ee75250b6481361a7861de85d21018e753da73277c9f6a9237f33bd41c7f3b6967b066facaa8137cc7cfa8ed782a94f394f3722244e6aaf3029ac82079af376c853b6d674637ab8df99e40a73f3d535fd8e69cf44a04552d4db51f885b352614e9d156f4f1043df368af6fefceed1a592e581291e0c85638405aa3372931a65451cac5a156c228c16973fd18787d750b364cdf59be40f00435752ab577d5f415c95e1879d266c7a62415ba020c276906c1a523a4cd0c06ec2466b73f48de0e7085cb8813bf832c5dbe0c0f19d28e532bc5b2f129454b3d077ba21f00d8b2f993c9b5d7782cb4b377f96bd10a51d87b8dd0180cb68dd16223037495487eb84d8c1cf3a42f98f230d122074281684cdfea7e54cd66f263e729c8a0e4e8592ffd0ab06401ac38c490aaa6c642ab4bf109cc041d9a660ed7a2631fb9a0556e18be5b39b9410807e0bd31e035994c9220db7146b5d59ecd0ae371a901dae193f7d2f43014c56abb6e0aa6b160365724b0236a512f43de29a53cddb67a958784099abd4d9fa8d7a0007a42b87a4bafa368263e1bf321bb0cfc75003f1c9f7a45df691dfdccc483efcbf8fa3de4fd078194dd89904b3413cb3da412a05b9acf22eb585a377afa38535e9846a3f50bb3617815a2723554c3317d28688541a8343f794358d99b14a60bbff085954540e0a708c84a37cb76a2ed455280a5cbb2ea1061d4147696c87df2828cc99ec7359a4a81ec325c3d0"}, {@broadcast, @broadcast, 0x20, "1d42e9ce7df8eaab30194a24207916b0dabea6f7d39867775fccbd95d8996607"}, {@broadcast, @broadcast, 0xb4, "712abd4bee367935c73e6e2dff4f2ecc92bb8914ff0caa5c31eaf26e2eb95c22fc9c9f66bc14a2ff3155bd37787acf1bcdf26ceb33c41fa15f042a9fd3452c660298b1ac82a0e764d11f4ad6f580da218fd2fb0cfb1fdce4b038cdd70aac55edad4bb69795a67e2a88a6eae8fc3dea7a93f31f48ab10e8834e936bf5d7d484cb7b9b76af7303527f9310cb2104b69ac4d4486a25a0cdb00b986e891573c24e517dc677d37d6ab955a4e81dc825a20a1b48489a5b"}, {@broadcast, @device_b, 0xbc, "435fab00ac8c69b1e919840455919b4fb76966fddbf118968a5b9aa4b958a097ea12045f67e6858f261fde440b8478dfb400dd3487f6632aa6065f2cde79d44a8d6bfcafb3820332a312bc443f6124d0e69e8f07c778f16d4f2c3e1656139057f875b782873bb2a4548bc357f99bcd69440b6797443e2a20a381eb3d2c3ae071cddfcc85fd0dceeb78f9ac05f65068ac0a708eca88043c03c2d98a52e28d628b031ae4db4b616507426d901c7b9ee8b8cf3b276cd3ce63a5c1b714f1"}]}, 0x1296) 04:06:46 executing program 1: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) [ 854.154340] loop0: detected capacity change from 0 to 32792 04:06:46 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) r2 = getpid() setpriority(0x0, r2, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040), 0xb5, 0x400000) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x7f, 0x6, 0x0, 0xf4, 0x0, 0x400, 0x90000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2ce, 0x2, @perf_bp, 0x3014, 0x0, 0x1, 0x8, 0x401, 0x5, 0x9, 0x0, 0x2015, 0x0, 0x5}, r2, 0xc, r3, 0xf) finit_module(r1, 0x0, 0x6) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) dup2(r1, r4) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) [ 854.204214] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 854.208208] EXT4-fs (loop0): get root inode failed [ 854.209122] EXT4-fs (loop0): mount failed 04:06:46 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 04:06:46 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) syz_open_dev$vcsa(&(0x7f0000000000), 0x10000, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) finit_module(r1, 0x0, 0x4) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x204201, 0x0) fchmod(r2, 0xc4) 04:06:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2, 0x101000) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) fcntl$setstatus(r0, 0x4, 0x4000) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = fsmount(r0, 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x9, 0x2, 0x5, 0x40, 0x0, 0x49, 0x41a0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x74d, 0x1, @perf_config_ext={0x7, 0x5761}, 0x10400, 0x7c43, 0x1, 0x2, 0x200, 0x5, 0x1, 0x0, 0x38000000, 0x0, 0x100000000}, 0x0, 0x7, r2, 0x0) [ 854.267353] Invalid ELF header len 9 [ 854.271318] Invalid ELF header len 9 04:06:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 21) [ 854.428127] FAULT_INJECTION: forcing a failure. [ 854.428127] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 854.429905] CPU: 0 UID: 0 PID: 7743 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 854.429939] Tainted: [W]=WARN [ 854.429947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 854.429959] Call Trace: [ 854.429966] [ 854.429975] dump_stack_lvl+0xfa/0x120 [ 854.430009] should_fail_ex+0x4d7/0x5e0 [ 854.430044] strncpy_from_user+0x3b/0x2f0 [ 854.430072] getname_flags.part.0+0x8d/0x540 [ 854.430102] getname_flags+0x95/0xe0 [ 854.430133] do_sys_openat2+0x9f/0x240 [ 854.430159] ? __pfx_do_sys_openat2+0x10/0x10 [ 854.430199] __x64_sys_openat+0x142/0x200 [ 854.430226] ? __pfx___x64_sys_openat+0x10/0x10 [ 854.430267] do_syscall_64+0xbf/0x420 [ 854.430301] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 854.430333] RIP: 0033:0x7f0eb7fc2a04 [ 854.430351] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 854.430371] RSP: 002b:00007f0eb5584ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 854.430392] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb7fc2a04 [ 854.430407] RDX: 0000000000000002 RSI: 00007f0eb5585000 RDI: 00000000ffffff9c [ 854.430421] RBP: 00007f0eb5585000 R08: 0000000000000000 R09: ffffffffffffffff [ 854.430434] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 854.430447] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 854.430478] 04:06:58 executing program 5: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r0}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e8000000", @ANYRES16=0x0, @ANYBLOB="01002cb57000fddbdf256000000008000300", @ANYRES32=r0], 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0xc000) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000003c0)='./file1\x00', 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002b80)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000229bd7000fddbdf251400000008000300", @ANYRES32=r0, @ANYBLOB="0c009900010000004a00000034008100050002000800010005000100050000000500020004000000050001002000000005000100080000000500020081000000"], 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000044) r2 = dup(0xffffffffffffffff) r3 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r3, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r3, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000540)={0xc4, 0x0, 0x800, 0x70bd29, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x20008000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x12, r2, 0x0) pwritev2(r1, &(0x7f0000000380)=[{&(0x7f0000000180)="bd", 0xfffffdef}], 0x1, 0x0, 0x0, 0x0) 04:06:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) keyctl$chown(0x4, r2, 0x0, 0x0) 04:06:58 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) 04:06:58 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) keyctl$chown(0x4, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, r1, r2, 0x0) keyctl$chown(0x4, r1, 0xee00, 0xee00) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) 04:06:58 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_provisioning(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000400)=ANY=[@ANYBLOB="0001000000180000f01b80cfc867f82b14161d2412"], 0xe, r0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$link(0x8, r1, r0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="ced246c91a2a653ff8db8e03780bd1bf7591d0657f22a98f5549a36b35f595b795203395fa3b12d8707cc505ed051eec2b206c1e3099bfec53a1f774002f175f07565c", 0x43, r0) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000003c0)='user\x00', r0) 04:06:58 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x1}, r1) r2 = getpid() setpriority(0x0, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) r4 = getpid() setpriority(0x0, r4, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) getsockopt$packet_buf(r7, 0x107, 0x6, 0x0, &(0x7f0000000440)) clone3(&(0x7f0000000400)={0x100000200, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x41}, &(0x7f0000000200)=""/184, 0xb8, &(0x7f0000000140)=""/44, &(0x7f00000003c0)=[r2, 0xffffffffffffffff, r3, r4], 0x4, {r7}}, 0x58) 04:06:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 22) 04:06:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x40010, r3, 0x620000) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, 0x0, &(0x7f0000000440)) r5 = getpid() setpriority(0x0, r5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000840)=@IORING_OP_STATX={0x15, 0xdbfd4cba48b6697e, 0x0, 0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000800)='./file0\x00', 0x10, 0x6000, 0x1}, 0x80) geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r9, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000900)=ANY=[@ANYBLOB="710000007d020000005a00dc04040000001a0000000002000000002000000000001870000000000012002f6465762f6c6f6f702d636f6e74726f6c0002002d2f12002f6465762f6c6f6f702d636f6e74726f6c00010000020028230000000000000000000044f89658c047b802138f", @ANYRESDEC, @ANYRES32=r8, @ANYRESHEX], 0x71) sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000280)="25c7d88ae735cbe9c4d5dcbf6869bd2463488c3f45e064a20f124954ee3d72bbf95bc7a5809501749ee915f1fb5a1d46f67d4cc687620cd7c5711e495ec6029e3a40196021d70ac9968f5b6ea77a5cd58f3390745e3963f100c496907baf5d5d0d954ac9a61ae08a56248ba7c014a176f605d8dbf77bc3eec26115503f59bffe7b67d40270639daeda40da77f42e6cf45b8c6c826b9ea541083436f71128349226e7c9637d38e4a8d6604a63af7dae0099ddf474d8c11cc0caefce3f", 0xbc}, {&(0x7f0000000480)="1b9af9ecd43b427a41826117865a16d8c1db04c57d2c6c4d1c967811f3aa9bdf4e443bb503599e188fdbaa3ee569a066bf6c7e0142a88047bddb5a927af704289388e6b27217403edb0364d836445b9ec82c2e3d6a1aaba6b18661ca4cb978b08b94e5e4658bd0bf81f0a582749cb3c1e89bb40c3e2af16592625921773a1897a3e1b3d59aea3ef8128c4466db4e925759d0eab617dc5b30b6af4ae3dedf972082c18c881a4e27fbb7efe3df0336d6106748c5e3a4720e96b55b00b0c34df9ae9724d5076aa04d6b44baf9919528d3ac8901bef489d51e0a6045413df2dd3199", 0xe0}, {&(0x7f0000000580)="01264d974546f8ed6dc5f6f229c7824a0f8cd25d28debf6bac0cdd90647842d37335f4eebe312778666ae38accc2c6c4904be8c827bc27a59cc8a0c79d0cd5fb344a2bb1553bc71557875d505ec2f2a4121d7afea6501c5f235d68599fb39c11fcedda955a7aaae520915f9e18df6a79998c13b05d988aa71721eeeb46829d82a5dafef9c06ddd64504720afc7621bbda6031fcf833e3f59b38ace1f1a4a044a6a08f5ac5dd4916fe3c3cc9537fe16e06f2e1ed6c53d7044b6015e984e7d21a8759d4da844f48b8c09", 0xc9}], 0x3, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r8}}}], 0x40, 0x4c804}, 0x20044800) [ 866.432609] Invalid ELF header len 9 [ 866.473150] FAULT_INJECTION: forcing a failure. [ 866.473150] name failslab, interval 1, probability 0, space 0, times 0 [ 866.474104] CPU: 1 UID: 0 PID: 7766 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 866.474123] Tainted: [W]=WARN [ 866.474128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.474135] Call Trace: [ 866.474140] [ 866.474145] dump_stack_lvl+0xfa/0x120 [ 866.474167] should_fail_ex+0x4d7/0x5e0 [ 866.474187] ? alloc_empty_file+0x58/0x1e0 [ 866.474201] should_failslab+0xc2/0x120 [ 866.474215] kmem_cache_alloc_noprof+0x80/0x760 [ 866.474241] ? alloc_empty_file+0x58/0x1e0 [ 866.474254] alloc_empty_file+0x58/0x1e0 [ 866.474269] path_openat+0xee/0x2d30 [ 866.474305] ? __pfx_path_openat+0x10/0x10 [ 866.474329] ? __lock_acquire+0x451/0x2250 [ 866.474348] ? __pfx_perf_trace_lock+0x10/0x10 [ 866.474371] do_filp_open+0x1e8/0x450 [ 866.474381] ? __pfx_do_filp_open+0x10/0x10 [ 866.474398] ? find_held_lock+0x2b/0x80 [ 866.474423] ? alloc_fd+0x2c1/0x560 [ 866.474449] ? lock_release+0xc8/0x270 [ 866.474465] ? _raw_spin_unlock+0x1e/0x40 [ 866.474490] ? alloc_fd+0x2c1/0x560 [ 866.474512] do_sys_openat2+0x107/0x240 [ 866.474527] ? __pfx_do_sys_openat2+0x10/0x10 [ 866.474549] __x64_sys_openat+0x142/0x200 [ 866.474564] ? __pfx___x64_sys_openat+0x10/0x10 [ 866.474586] do_syscall_64+0xbf/0x420 [ 866.474602] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 866.474614] RIP: 0033:0x7f0eb7fc2a04 [ 866.474624] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 866.474635] RSP: 002b:00007f0eb5584ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 866.474647] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb7fc2a04 [ 866.474655] RDX: 0000000000000002 RSI: 00007f0eb5585000 RDI: 00000000ffffff9c [ 866.474662] RBP: 00007f0eb5585000 R08: 0000000000000000 R09: ffffffffffffffff [ 866.474669] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 866.474676] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 866.474693] 04:06:58 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x800) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x80, 0x1f, 0x3, 0x0, 0x10001, 0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0xffffffffffff0dbd, 0x3ff}, 0x4c080, 0x80, 0xffff, 0x3, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x6537fa85}, 0x0, 0x0, r1, 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) dup(r2) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x4, 0x2, 0x5, 0x3, 0x0, 0x4, 0x82442, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x400, 0x9}, 0xcd6, 0x5, 0x4, 0x6, 0x800, 0x1ff, 0x6, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) ptrace(0x8, r3) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) 04:06:58 executing program 6: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x6, @link_local}, 0x10) r0 = perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r1, 0xffffffffffffffff, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x2, 0x1, 0xac, 0x20, 0x0, 0x3, 0x40000, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8, 0x8000}, 0x4100, 0x9, 0x7, 0x8, 0x8, 0xc5, 0x8, 0x0, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x4, r0, 0x0) [ 866.558616] Invalid ELF header len 9 [ 866.566537] Invalid ELF header len 9 04:06:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) keyctl$chown(0x4, r2, 0x0, 0x0) 04:06:58 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) fcntl$setstatus(r1, 0x4, 0x42400) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) fcntl$addseals(r2, 0x409, 0xc) finit_module(r1, 0x0, 0x0) 04:06:58 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000002e00), 0xf}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000002d00), &(0x7f0000002d40)={'fscrypt:', @desc3}, &(0x7f0000002d80)={0x0, "7a1d8db5592aec44742f5e9d5ce9b24923b512b5078c5044ee6831ba73eeca43184bce196cb57af6b8580332bcdb930563267e864fa66a0fb76d72f2924d1335", 0x23}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000002880), &(0x7f00000028c0)={'fscrypt:', @desc2}, &(0x7f0000002c80)={0x0, "57b04361e6fde8ee6f3a05041a71a325f49a2b229507df831aa204f4397c798f11bfa3d7fe377b43b8b5fec4a9f21e396faad086c76a01f39566f1688bc6a557", 0x30}, 0x48, r1) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002a80)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x1, &(0x7f0000001680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/110, 0x6e}, {&(0x7f00000003c0)=""/74, 0x4a}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/110, 0x6e}], 0x4, &(0x7f00000014c0)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001580)=""/227, 0xe3}, {&(0x7f0000002e40)=""/145, 0x91}, {&(0x7f0000001740)=""/213, 0xd5}, {&(0x7f0000001840)=""/81, 0x51}, {&(0x7f00000018c0)=""/10, 0xa}], 0x5, &(0x7f0000001980)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}], 0x98}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001a40)=""/162, 0xa2}, {&(0x7f0000001b00)=""/186, 0xba}, {&(0x7f0000001bc0)=""/58, 0x3a}], 0x3, &(0x7f0000001c40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}, {{&(0x7f0000001d80), 0x6e, &(0x7f0000001fc0)=[{&(0x7f0000001e00)=""/88, 0x58}, {&(0x7f0000001e80)=""/111, 0x6f}, {&(0x7f0000001f00)=""/48, 0x30}, {&(0x7f0000001f40)=""/80, 0x50}], 0x4, &(0x7f0000002000)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000002040), 0x6e, &(0x7f00000026c0)=[{&(0x7f00000020c0)=""/21, 0x15}, {&(0x7f0000000200)=""/69, 0x45}, {&(0x7f0000002180)=""/107, 0x6b}, {&(0x7f0000002200)=""/187, 0xbb}, {&(0x7f00000022c0)=""/184, 0xb8}, {&(0x7f0000002380)=""/239, 0xef}, {&(0x7f0000002480)=""/85, 0x55}, {&(0x7f0000002500)=""/161, 0xa1}, {&(0x7f00000025c0)=""/213, 0xd5}], 0x9, &(0x7f0000002780)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f0000002800)=@abs, 0x6e, &(0x7f00000028c0), 0x0, &(0x7f0000002900)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x148}}], 0x7, 0x10100, &(0x7f0000002c40)={0x77359400}) keyctl$chown(0x4, 0x0, r2, r3) [ 866.645502] Invalid ELF header len 9 04:06:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 23) 04:06:58 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r1, 0x0) r2 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r4, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r2, r3, r4}}, 0x71) keyctl$chown(0x4, r0, r1, r3) 04:06:58 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) geteuid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r3, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x71) keyctl$chown(0x4, r1, 0xffffffffffffffff, r2) keyctl$chown(0x4, r0, 0x0, 0x0) [ 866.768589] loop0: detected capacity change from 0 to 32792 [ 866.804310] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 866.815238] EXT4-fs (loop0): get root inode failed [ 866.816042] EXT4-fs (loop0): mount failed 04:07:07 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) openat2(r3, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xa02, 0x24, 0x6}, 0x18) finit_module(r0, 0x0, 0x0) 04:07:07 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) keyctl$chown(0x4, r2, 0x0, 0x0) 04:07:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 24) 04:07:07 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='!&\x00', 0xfffffffffffffffd) r2 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r4, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r2, r3, r4}}, 0x71) keyctl$chown(0x4, r1, 0xee00, r3) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r5, 0xee00, 0xee00) keyctl$chown(0x4, r5, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, r0, r0, 0x0) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000), r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r3) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x44, r4, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0x44}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r4, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private=0xa010102}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private=0xa010101}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private=0xa010101}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000801}, 0x4000000) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8929, &(0x7f0000000840)={'wpan0\x00'}) 04:07:07 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:07 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) fstatfs(r0, &(0x7f00000003c0)=""/4096) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) 04:07:07 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, '.*{,['}, {0x20, 'keyring\x00'}, {0x20, '[,\xf3&-)/{\'-'}, {0x20, 'keyring\x00'}, {0x20, '#'}, {0x20, 'syz'}, {0x20, 'keyring\x00'}, {0x20, 'keyring\x00'}, {}, {0x20, '-%]($'}], 0xa, "ec889a6671ced4586d29c99442b48f5e47472ac676887fd4c2a711ba01ab3296af6b0526c6832cdc3d97144727bc04b6ad627488bf93cf4ba914b3e86c5129df6a0e6fbc28043daef7a27084ae40cbcc1e92a60b9aa21359ed8c9306"}, 0xa9) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) [ 875.452520] Invalid ELF header len 9 [ 875.471278] FAULT_INJECTION: forcing a failure. [ 875.471278] name failslab, interval 1, probability 0, space 0, times 0 [ 875.472335] CPU: 1 UID: 0 PID: 7821 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 875.472354] Tainted: [W]=WARN [ 875.472358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 875.472366] Call Trace: [ 875.472371] [ 875.472375] dump_stack_lvl+0xfa/0x120 [ 875.472400] should_fail_ex+0x4d7/0x5e0 [ 875.472426] ? security_file_alloc+0x35/0x130 [ 875.472456] should_failslab+0xc2/0x120 [ 875.472470] kmem_cache_alloc_noprof+0x80/0x760 [ 875.472492] ? __create_object+0x59/0x80 [ 875.472514] ? security_file_alloc+0x35/0x130 [ 875.472531] security_file_alloc+0x35/0x130 [ 875.472550] init_file+0x95/0x4c0 [ 875.472566] alloc_empty_file+0x76/0x1e0 [ 875.472580] path_openat+0xee/0x2d30 [ 875.472608] ? __pfx_path_openat+0x10/0x10 [ 875.472626] ? __lock_acquire+0x451/0x2250 [ 875.472643] ? __pfx_perf_trace_lock+0x10/0x10 [ 875.472662] do_filp_open+0x1e8/0x450 [ 875.472672] ? __pfx_do_filp_open+0x10/0x10 [ 875.472689] ? find_held_lock+0x2b/0x80 [ 875.472707] ? alloc_fd+0x2c1/0x560 [ 875.472730] ? lock_release+0xc8/0x270 [ 875.472746] ? _raw_spin_unlock+0x1e/0x40 [ 875.472765] ? alloc_fd+0x2c1/0x560 [ 875.472787] do_sys_openat2+0x107/0x240 [ 875.472802] ? __pfx_do_sys_openat2+0x10/0x10 [ 875.472824] __x64_sys_openat+0x142/0x200 [ 875.472839] ? __pfx___x64_sys_openat+0x10/0x10 [ 875.472861] do_syscall_64+0xbf/0x420 [ 875.472877] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 875.472889] RIP: 0033:0x7f0eb7fc2a04 [ 875.472899] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 875.472911] RSP: 002b:00007f0eb5584ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 875.472923] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb7fc2a04 [ 875.472930] RDX: 0000000000000002 RSI: 00007f0eb5585000 RDI: 00000000ffffff9c [ 875.472937] RBP: 00007f0eb5585000 R08: 0000000000000000 R09: ffffffffffffffff [ 875.472945] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 875.472952] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 875.472969] 04:07:07 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:07 executing program 5: mq_open(&(0x7f00000000c0)='{@!(*@\x00', 0x40, 0x0, 0x0) mq_unlink(&(0x7f0000000100)='{@!(*@\x00\xb82\xd2[<8\x99\x03\xa7\xaa\xf7\xa1_K9\x963\xfa\xb4k\xfa`8\x7f\xadv\x0e7\x13\x17\xe6\xeeY\xd1\xc3\xc4^\xfajU\x96$\xbfO\xee\x8f\xe4U\x13\xba\xcb\x1c\xb7\xe3\xa5\xe3o\xda\x96\x81\xf5\x7f\xa1\xeb[\xed\xa6n\x1eq\x1c.3\xa0\xb2\xaeP(X\xd2~,\xe7e\x86\x01\xb5\f\xc5+\v\x87\xff)&\xddu\x82b\x94e\xe0\x03\x9c\x8c\xf7,\x89@\xff\x83\xa7\x97\x96\xcb\xee\xeb\xdb\xb8Z\xae\x17\xc1>\xac\xff\xd1H\x00b\xe7\xc3\xcd\x90\x84\x7f!U\xcf\xaeE5z\xa03\xca\xe9V\xc2q1\x85!\xc4g\"\xdb\xbd\xdf\xd4\x03O\xfd\xfc\x057\x00\x00\xcbN;i\xff\xf8\xd7J\x9a\x85\xa3\x88\x19\xd8\xc5;<\xf3\xb2U\x95\xc1\xd0\xcf\xf6Z\xd2#\x8d\f\xcb\x97\x00\x00\x00\x0e\xc1\xf2b\xe35W\xf2^k\x8bq\x15m\xcf\xc2\xc6O%\xb2\x16\x9fc\xd8Lp\x0ee\xbd\xe5p4n\xfa\xa4\"\xec\xe23x\xfb\xad\xfc\xd2\xaa\x87\xefD\x17G\xc2\xbf\xf4\'\x01/~\x10\xcaUo\xe6\xe1\xb9\x12\xeb\x89l\x96\x95\xa8\xad!2=tr\xb1O\xa0y\xa2r\xff\xff\x00\x00\x00\x00\x00\x00\xc1\xf7T\xad\xbd\x00\x00\x00\x00\x00$\xdal\xc5\x1f9\xe7\xe3\xf6K=\xab\fO\x01\xd4*}\x00\xc0GD\xb6\x8c\xc9%A\b\x8c\x1cdB>\x16\b\xfa\xfe\x1c}+\x86Bh\xc4\xf4\xf3\x94$}8\xd0Q\xcb\xda\x80\x88l\xf1\xf5\xfa\r\x15`\xcaS#;\xe6\xb539Z\xbf\x98b\xca\xb4q\xeb\xd9\x01\xdd\x007\xbe\xc0\x13\xf6\x86\xee\xfe\xd2\x1ds\xcd\x1fO\xa82\x9a\xb4?\x81l\xdf {:(\xbe`\x99F\xca\\\xb1V\xc7\x14\x8da\xf24\x03\xf7\xb6\x88\xddo\xd9^\x9dkv[\x19\x871\xde\xc0\xf0\xc8f\x8f\xf4\xae\x97\x9e\x89\xa7\xe2\f\xdf\r\xc21\x85Q\x0f8\xca\x98*\xbb\xa9\xb2\xeep\x1b\xed\xd0\xe2;\xb6#\x8a\xb7\x17\xe3\x00\x9c\xac\xb2\xdd\x95H\x00\x00\x00\x00\x00\x00') 04:07:07 executing program 2: getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000200)) getgroups(0x4, &(0x7f0000000240)=[0xee00, 0x0, 0xee00, 0xee00]) r2 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) setresuid(0x0, r4, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r2, r3, r4}}, 0x71) r5 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) setresuid(0x0, r7, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000004c0)={0x105, 0x7d, 0x0, {{0x0, 0xee, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0xa6, '\x00\x00ev/loop-control\x00\xe8\x13x\bd\a\xe5\xb9;\xfd\xc8\xd3\x8c6\xbeb\xf6\x893\x0f\xbc\x9b\x9d.\xde\x022x\xda\xa3E\xb4JG\x80\xb5\x9f6g:\b0?G\xa4q\xaf\x974\xed\x93\x18\xd3BJ\x91vl\x11\x92\xf8\x9fe#\xc0^\xe0\x85\xf8\x12\xebNP\xc8\xa6P\x9aQ\xfez\xa2\xc7|\xdb\x0f\xdduc\x00n\xff\xba\"\x81\xf7\x137\xa4\xaau<~\n\x1f\r/\xd8EL\xa7%\v\x8e\xdc\xd80|\xc5\xa7\xa8\xb3M\xe3\x86\xee\xc9]\xa4\x8d\x16\xb8\xee\xc1\x17\xedc\xdc\xfe\xac\xa6\xb7\x02\xe7\xf7W\x9b\x16\xe9', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r5, r6, r7}}, 0x105) getgroups(0x8, &(0x7f0000000280)=[0xee00, r0, r1, r3, 0xffffffffffffffff, 0xee01, r6, 0xee00]) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = memfd_create(&(0x7f0000000600)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf7b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8\xfa\xb0\x1d|\x84<_\xaa\x82\x82\x95$\v\x9c\x1d}2)\x19?=\x82\x03b\xdc\xeb\xb4\xfa\x97\x9a\xddC\xebU\x871\xe4N\x17\xc5\a\xf3)\x05\xb9\xb64\xb8*\x8cO\x8b\x13z\x06\xbf\xc8,\xf9\x01#z\xfb0\xc1{\xd4D\x1d`~\xd3e\x96k\xac\xb1\xbb\xb9\xed\xcc$T\xc47P2\xe0\xdc\xe5\x06&L\x1aY0\xbf\xcc\xbc\xf0\xb0\t8\x82\x82\xaa\xd9\xf4\x94\xdf\xff\xfbv\x9f\x97\xeaU6jS\xdd\xdb/Hns\b^5Y\xc5\xf8\xd2\xb8:X\r\xd8\xfc\xe9\xbd\xdd\x83\xf3\x99\x03\xd3\x06\x9b\xc3\x8b\x97\xca\x0f\x05\x82X\x0f\tq\x9f\xd7', 0x0) setxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440), &(0x7f0000000480)=@v2={0x2000000, [{0x4, 0x3}, {0x7, 0x2c}]}, 0x14, 0x2) r9 = getegid() setgroups(0x1, &(0x7f00000003c0)=[r9]) ftruncate(r8, 0x9) finit_module(r8, 0x0, 0x6) 04:07:07 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xd3, 0x3f, 0x6, 0x40, 0x0, 0x4, 0x10000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_config_ext={0x9, 0x4}, 0x100, 0x2f00000000000000, 0x7, 0x2, 0x0, 0xfffffff8, 0x14, 0x0, 0x9, 0x0, 0x10000}, 0xffffffffffffffff, 0x7, r0, 0x2) r2 = openat$incfs(0xffffffffffffffff, &(0x7f0000000200)='.pending_reads\x00', 0x80000, 0x89) fcntl$setstatus(r2, 0x4, 0x2000) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) finit_module(r3, 0x0, 0x6) close_range(r0, r3, 0x2) finit_module(r1, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fef000/0xe000)=nil, 0xe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:07 executing program 5: perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000003000000000b00"/24], 0x414d02) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$nl_route(0x10, 0x3, 0x0) fchown(r2, 0xee01, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r1, r3, 0x0) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f0000000440)=0xffffffffffffff71) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) recvmsg$unix(r0, &(0x7f0000001800)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f00000016c0)=[{&(0x7f0000000140)=""/60, 0x3c}, {&(0x7f0000000180)=""/201, 0xc9}, {&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000300)=""/10, 0xa}, {&(0x7f0000000400)=""/213, 0xd5}, {&(0x7f0000000500)=""/201, 0xc9}, {&(0x7f0000000600)=""/156, 0x9c}, {&(0x7f00000006c0)=""/4096, 0x1000}], 0x8, &(0x7f0000001740)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xc0}, 0x100) perf_event_open(&(0x7f0000000040)={0xa3e1f01711553f2f, 0x80, 0x1f, 0x1, 0x20, 0x20, 0x0, 0x9, 0x0, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_config_ext={0x4, 0x2}, 0x0, 0x5, 0x1ff, 0x5, 0x5, 0x7, 0x8000, 0x0, 0x2, 0x0, 0x8}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x19) close_range(r0, 0xffffffffffffffff, 0x0) 04:07:07 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) finit_module(r3, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x101) 04:07:07 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:07:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 25) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) [ 875.721910] Invalid ELF header len 9 [ 875.725915] loop0: detected capacity change from 0 to 32792 [ 875.741209] Invalid ELF header len 9 04:07:07 executing program 7: r0 = perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x1, 0x8, 0x0, 0x61, 0x0, 0x7, 0x40019, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x7f, 0xfffffffffffffffd}, 0x3c0a0, 0xff, 0x5, 0x7, 0x7, 0x2, 0x8, 0x0, 0x9}, 0x0, 0x3, r0, 0x2) 04:07:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 875.752818] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 875.758406] EXT4-fs (loop0): get root inode failed [ 875.758849] EXT4-fs (loop0): mount failed 04:07:07 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) 04:07:07 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r3, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r1, r2, r3}}, 0x71) keyctl$chown(0x4, r0, 0xee00, r2) r4 = add_key$user(&(0x7f0000000140), &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000003c0)="fd6f06a85a0474e2fd028601f5be7af7dc84016633899009ec1c957b6a3f0399165eb076c46611217e617cd9c49130487f87e8cd90156f7ba85e46e13c7b9f3d57e15e7512c958f3c5e8f1eca34bd66770fdfe1caeb280761399bb65914a97ea2d84cd50474eec6baf9ea3c134a6004800de1eec6cba607cdd53b82f22d432ab7cf972aa0e7f08569824975ea7ab84a7323952ac6d4c5ca9038e2c540f31242c347e6506494dbdc0f63c02965711e47d00a40929cd286f7907890224f3ea96be475c34c15d5c9b5361cf8a1d623578523fcd297e644b22c06ec81e76f82060e00d43c06558ff4746817243be6c379c605635853533c300", 0xf7, r0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r5, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r5, r6) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x8, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r7, 0xee01) 04:07:07 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x9) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9014c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100100000}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000700)=[{&(0x7f00000000c0)=""/11, 0xb}, {&(0x7f0000000200)=""/191, 0xbf}, {&(0x7f0000000480)=""/231, 0xe7}, {&(0x7f0000000580)=""/174, 0xae}, {&(0x7f0000000100)=""/17, 0x11}, {&(0x7f0000000640)=""/172, 0xac}, {&(0x7f00000002c0)=""/111, 0x6f}, {&(0x7f00000003c0)=""/116, 0x74}], 0x8, 0x1f, 0x400) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) [ 875.905917] Invalid ELF header len 9 04:07:19 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) finit_module(r0, 0x0, 0x6) 04:07:19 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:07:19 executing program 4: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$chown(0x4, r1, 0xee00, 0xee00) r2 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='*\x00', r0) keyctl$update(0x2, r2, &(0x7f00000003c0)="f600718f9afce437631e8b11a88376a8c985bf43b50f6905e20f383aeeb4dfede75bb5e3cd3989f42d2c80609afb862f23b0bbb4c86c4094cdac5e2155cca1e77e628bce5785cda84e314c6f572ab0fc58cb855fa42169fbbef72ca5e91d6bc9dee88152dbb16619a8f6610f94fda2ec7fdc9d04cbfbfe6b69995c09e8776cb652534351ef8e1cd6fd81a8552b23d51e79b58c1852941063b6d1797de578443b86d81cd0d21c598ee2c86f429091a5a6f4f375837c23e5c400f422f4c7b8ef539bf37c43a302f3cce8a805ab561d79647cf09446a318a884750fec8e611450a683365bd387ecae1cb06b46a593015e6c6c9f76b7bd92fca983f6a2afc7414bb69c6014afa555aa2419c5996037c4f18dc1844f4ab933d0a9ed29d907dbec1a3f3dade3063afbee5777f2c20253102ef9c7b006cb54b33a93567f61621981e5567a5ca8505bf45cb8c5c8006342292edda27e8fe2d0be6144d2ab7e1270c75c70190bbf8c266484504b18717fc90ce679b180c7daa1efd39369828f49c75fc7fd1a3add4c53a70dc01ac2733742c68a85bc934dbf1dc5ca4e304a9801f734607c1859a3760d124f313b7ef8a72470c4af1f5f8c1308e875aa8c7cf1155a3cb3d7c027c8f8b74ae43e6a1c732a86195f1d16510ea935d21217f79039c26a5a5b4927b44fec335884c3df138d5c00f6329358968cb5a398f7c44b96f3589ffca91e840a1df97bf5ecf61d2b0c025d9e18b99f72f177ea9970ff72e9acf99b4ba55ec4f4b389c4a5788e01c45e8e01fe81314d11010f36107f1707484ecda61d8a33749e457786a22a0d3ef511454e0b113c3304d135089a4f61f9b5218b9ba00625de130e2adeb4f5c5625dbc2696e76f26f6d94f759c8f69665f83526033a8facdd5676395132be301bfeae229454e8eeaaed5efa5b9933cdb6c79e3c904e4ae08e74761a445ea6d19807dbaf02ba730b8479db94798760d0e296823e2c48f39a397a0b168c56e011da1ed8c8612fd2932b35d2b94f3b6b54dd7c7255ba2f3d0b2705aa2fe3851a810999fe565e64078d5ffb4cda18144bc3a95599072d44431b86c74665fd2fd26da8dbbd984e944a29d11fa8e9a1c61baeceb4020d3ba4df1b3ad1bb6947ade6559a77795031615b0224f583a56a26c29ed9dee53bfa352a40568a9e589fbe52d30824dede2cf058af7d3eb560309824bad03e0a4d8879ac2ae9c48b4778ab2be6827931659508c2dc7a92d5ec75dae5de3ef3c659812b026add3d9e08a708ae6e0582286a67061a2c17edc32b8484ebf3980204cfcaa2aa4084756264a99154c01a46ddd26f232c15087762a3163a62f40c4fe8f2bb787184ac4072adfac1cc659279be7edeeaa09ea235f7a535798026b9f303753e5dafa436d90a97f3c0177d0104bfe68222d798d46bd1ac0c302a0d95b31a1dc9946bc912fa22bdab3d176f7b88d00b4e399f45018f8886f4747a8b3577ed034c09c1b62c5daf246e401a025085e6ba7ed1a6a0805bcc5eb668cf55ceae13aff5d725fd7d79e456eae262f09002a4a53b5d5e5fd9bf45e8922f3a978c776a58dde79230f01f1e5d2f9f67869d910e302769f5361218dbf9e10fbb23152d48cb1a5f5ebf2bc5db7226dd53c5fa74dcb669794e274bfd5e9179befa2ee29a7f02cc3fa951760c353b95b725bfd2e91669b08bc67d80d198b2ee5e87746b7c5f878c6f957a06495a108e6586c929d8024251227ad0f23147cc76f158325dc79fb1a96e878de5287f48e7f3a99c156825a7ca273c5a9195c36631378dce34af314024cd13560d5a8625faa311b20561521cd84c9ff042fe9eac351c1df9f60dc70c4441c3c8cf1c9614ddd496549a0e304e331e9cfcfc0f16fe6fd9a4f77ec2eba0e9bbecddb63a7bafd3d0f9d8ffccf462040d6485e8ca440c7b36a60c462919d1f98e78e51720254318649cd3634a0fa8fd181173509908b0234b3e264aafae39e4f6853007cd722397d765559a9e7d7a3c655183a4bf7b3598f96c3da4efb0c6eb93b994a1da55fe4fcc820243b168abf314df16803b6c65d3ba7205fded369ed35ca6b0320c29016e1a4519ed9cd1f4805f4c001cec35dfeb7443c5cce021936d638d481e9039eed5156f6dc4862206b7c38aaf6bb85403cdc3e7419e2a27f05a7477c0dff3fa7d078607a8051271a07350e21bdd7ffdac506d971df1fe640d9559c14c30b5ac896e0171a063b47c95e6f4d0760eb6c1db8e6dfb5057ad837e9bd2c2d3c606a71abe7746a5fc3ea96dd3b144b13987d677dffdee9f8c09eabe067fd677700b77ff49829621952624680b98c38a64afa719c792ffc24b504d5bb2bede4dc10fbd66f03d4d9ebc216a1d1b8b97058bc42c389c673d23f3be4e73416252defd99166627fbea0c405994ec2449f39353f7c2e81d8a641e79ae0a36838555df359e888bf53b410fa6fc1d5df8d892c8c91df61a11293d5a472667ec43ef1e77d5e85e5cad4f3a3e4a99969b0cbb8ad9457d21a39ddf4441f84388fe46611500aba0f3e9baf383ca3ab483e87c20e1f89268b6e8cb9efa6314649a0e0008dae86527807c01e736c0f60430c520003ac37d7882137ac643df78037625f47e72c5ae7dffb9cf37fa10b88d455d95d83d5469897cd8523c358b453d8ede3ae707420bbfbdd12af1aff400ee26b30aa67019761eb7ad0b678c8c2f5c2278a9df6182a70ac484fe6de789c07b9e806a5fabda4ce7fe1d309534cc51a7d243c8f8595d400763f00996302cf0f8204270a5e84b994195819cde0830355a3b8e6aad2f1ac3793adb5caa6dd7588956f75ea508a6683e4eabd733618bbf453602448e089a964b318de1768ed7f8b490a451a572c327412df756097cef2dfb60723ec6402ca39b6b71701fd187f360ef7c032577a53c1806c7a42cf981b76143673522d12404bb7a24f310b8d80fe6592a6d4c18e7c49af77bf055bcf3a12797ae28bd584953b7675738da240855aa0a2df98f1dde8df281cd7db689984ae07dafd21d990d586406745e59e44a9dc6ddf23f2d02d4c1f96c1e4ec20fa1e264ebbc1cdbe2b0df129815be7d17e040abf2196d8a55604968d642e2f9be4f3753fa3a532d2361e0e3f2ac94874b20fb0b05b5f51da992e5268f43ede825cc36dba626c2572d68471130ef1422ff9d6659b237273e3793ca6a92f27e4c6ca927a5d509b63ce2c9b625a54ee914c21dbd1962418deb93946eb273ddf51e9a82863737e206b484605c4da745e34015cd38b2e794cc22599424668378fbd43e4b360da7730168f4ad33b4a40bf2e53ca08dd4cf4c4fd7ebaa31fad58b5e206af00e77d2ad197bc3eed022f7a4bb2a93f78d47b29459a386adc6756af5267d2c2c5bde98408f1e8fc98f71dc3cb10170b44cdec8f9c0b4063b661f5cd21358ccf8af27c4ee0b0a15680c52757df57582f5a6132a1bcc479f6039612612dbf25c8ff3b6d1f697d05ff3ee3912a58aed1a76cc8ca1800290719cfb5dcc54e8ca02906e89e9409cfc6fb55292f7aa359dec26aa5d9eb0cd3270a376fece3c4690bf2ef998c26c1688b0de9e8eff815055d63d24c6263f6952173fb1a432e5e41dd123c59f5d2b49e738d39bd2a27d64253b9b7ab679b897eef02da1f1df4413fb804b1774414241eb4d1d1d5f41d02359bb86c48cf506180a1f5ceb82607b3f6470ebe5b3d713ca587281e57388b6f1dcf863b4af1c24428c3eeb2ffe1a4dae3819b1e2fdc9f15aa9d03a3931e6eb14f7f51f8d3b5aab6606b3bbd186497059ba83282590360e1ca1e80af6d0344fe2cc30ccef0852223a13f1ea0303ce65c3a269342d4dc142d92490e32790b85efd0ffaa22a0de4cb85b5bedde66006905c047555573a2c739d9b9dca0101d22aaecd0490574c7c186d9fd121aebea1466c454fce8b9619ab8cbfe34fb61f147cb95e80ffcafba23fe66bf90a3774d1d28b1e950d811ef0896c9cc3f823b450d76d2f4ecc2ecb454238e37a1dfa1b26906589e1726720ed4c0fb557473ed2e0f3671388e6a4d9bb6880798f0787a051b01c8002d33ca996ab330ad3c57290c1498001823e054805550f5decd13459517dc59c6f8e9aec8112e8c6fc9b38d7440d8dc4055264ca828623b43df4a0bcbae2cf43433b1d24be6c145ab3e77085923c65865b010cf4dc85d6084c2a05cc6b92705dcc4f34b1a57b9dfdf2d20d0aa8899057a9f67bdfd21af66fc257588295decc192c4680c24e73da157f3e5fc29cb791dcc8c2242033fd37a3d6f3d95dd3e5736bc5b3c81c2a87127307ed84242ca6bbff4af5e1b5a1d5e31c101ca0ec31f06f05de84b6ace24a10466fd7435a2a5cbf9585618a32aef319de29cf45e00939916fcfbd56081bd24ea898ccb0f1c55c3e51b09bcff5d1ba7e7068ce45fd1f27942632727f7735c1f131481d868731a215e2bd379952d8f00d5a3a9569b576a567512547cd52735f4c483188b3e6d6b5a30127da4514951901d8e4ae9d082b57f90e0f1cc6b61cc46160d14b43e29cde4c7ada17c8122ac67623b79f79d0f0c1a0e67240c4d408a6de489a219d9e735d7f78b170ee50e5f807dce922c0274856c1ba098ce435d13cb4c69a0b894f7daad6c138b981db7db47a8dd150c49942f6722504ee526a2e409f1fbecdd41dadb6b1b438a4bc2a4e549b145d1af15299e05915236833a3088afa73ff37bd694b3ef069a808829b6877ffcf14464749ea766134eaec9ba6b64c9ea7a83ad1180ab806a5f016f9d21079722fca478b623831a17e204c21d9a15e6a61c01eed5a69c87615260d6e21a72c3dea3b8f925859bcc0baf04e5689ec358cd1425e49ca8cd3d4b62d541302a4bc32b6662ba3da774c4f94738f0b2250a4de591023817dfb827b81f4a3f6721e9d4de06858fba5a2b95e5f4e06b16ecd6dd159e93a203b2a80d323147788da3907f4bb29ce8aff0c48e9df074c6d6f63cebef478120a1434d61ac70c7e5776bbf4e0f2bb3ac834323cfe19fc45ee3047821f2e7541e656d5a88cdd2601e32eeff458db49c48a4fa02e147df37d665195ec429de66a1599ec3a37f30b9f4805cdfeeabcdb57ca434807582cb038dac10f428d7f0d7418e4018c5329f71f0ccf93fdf065ab8188a50d8e13dc69c833245932ec7a0d5e7ba818f420ec6401f1c3bf846a7a8e610b1f4ad8ce54a9dcaa507bb7629dc18ed9bcb51952561c7a71058cf613b6a0984e52f42e439463735c2ee4e354db83172d6936a59e00204384ecdcdf153727561090a58fb8be04741b2c441fde860deed02d57c8ac1b96e7698a5ecab80bef52efa6d081e2086ad1da0c2975403643dda551a4bf4a11b94c5102887597a3a3152a257c3de429e3c324644b2d55b24e0f2d55127ea7d821c4581906bda5c6cdef22d728768f0f1dfad5ebd5be3cf30ce752fd9d2f96c5eed1ce4c599db93bc0a6816df0ade4418fffc5193282b574b8649737fe1ed880d63204488579d05edfc20d5bda73a1581859793b10330dbf338faf266bbf425c7115e27178f4474984fea115986209545497b4fa5eaa0869a23bda464e4b32766d2c6812c86b8686e408c8c433165e3d32b81137522badcbe171a0490b0ad443bb5d457c9857132f230e7965aad813be4c422d363b4740d55604b08a591ba4debb72a5c258720a1a15a03739ea18739c59fd7145cfebac0a6a391d7c8ab5380f5c7dd47eb86c2ba651e7a82cadf443cda0c47eb1a756ceb7d7248325b7e7bfe8ddda454301891dbe1b49b4d01e60ddf5dee3232576e8079f00fe2", 0x1000) 04:07:19 executing program 7: perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4108}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) ioctl$BTRFS_IOC_SET_FEATURES(r4, 0x40309439, &(0x7f0000000040)) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0x80) 04:07:19 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000200)=[r0, r0], 0x2) finit_module(r1, 0x0, 0x0) fallocate(r0, 0x8, 0x5, 0x8) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x2e, 0x0, 0x6, 0x7f, 0x0, 0xfffffffffffffff9, 0x204a0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x80, 0x2, @perf_config_ext={0x4f, 0x10001}, 0x4000, 0x3b6, 0xfffffffc, 0x9, 0x100, 0x4d5, 0x8, 0x0, 0x81, 0x0, 0x7aac}, 0x0, 0x8, 0xffffffffffffffff, 0x18) 04:07:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 26) [ 887.154163] FAULT_INJECTION: forcing a failure. [ 887.154163] name failslab, interval 1, probability 0, space 0, times 0 [ 887.156469] CPU: 1 UID: 0 PID: 7899 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 887.156511] Tainted: [W]=WARN [ 887.156519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 887.156533] Call Trace: [ 887.156542] [ 887.156551] dump_stack_lvl+0xfa/0x120 [ 887.156590] should_fail_ex+0x4d7/0x5e0 [ 887.156630] ? __kernfs_new_node+0xd3/0x930 [ 887.156661] should_failslab+0xc2/0x120 [ 887.156687] kmem_cache_alloc_noprof+0x80/0x760 [ 887.156733] ? __pfx_avc_has_perm+0x10/0x10 [ 887.156765] ? __kernfs_new_node+0xd3/0x930 [ 887.156795] __kernfs_new_node+0xd3/0x930 [ 887.156827] ? __lock_acquire+0x451/0x2250 [ 887.156861] ? __pfx___kernfs_new_node+0x10/0x10 [ 887.156899] ? lock_acquire+0x15e/0x2d0 [ 887.156926] ? kernfs_root+0x23/0x2a0 [ 887.156957] ? find_held_lock+0x2b/0x80 [ 887.156993] ? kernfs_root+0xee/0x2a0 [ 887.157023] ? lock_release+0xc8/0x270 [ 887.157048] ? lock_is_held_type+0x9e/0x120 [ 887.157084] kernfs_new_node+0x13c/0x1e0 [ 887.157128] kernfs_create_dir_ns+0x4d/0x1a0 [ 887.157169] internal_create_group+0x440/0xeb0 [ 887.157204] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 887.157246] ? __pfx_internal_create_group+0x10/0x10 [ 887.157280] ? blk_validate_limits+0xc27/0x15c0 [ 887.157313] ? lock_is_held_type+0x9e/0x120 [ 887.157345] loop_configure+0xc46/0x15a0 [ 887.157409] ? __pfx_loop_configure+0x10/0x10 [ 887.157462] ? avc_has_extended_perms+0x107/0xf20 [ 887.157487] ? find_held_lock+0x2b/0x80 [ 887.157524] ? avc_has_extended_perms+0x23b/0xf20 [ 887.157549] ? lock_release+0xc8/0x270 [ 887.157582] lo_ioctl+0x66d/0x1ca0 [ 887.157619] ? __pfx_lo_ioctl+0x10/0x10 [ 887.157647] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 887.157683] ? lock_acquire+0x15e/0x2d0 [ 887.157710] ? __virt_addr_valid+0x1c6/0x5d0 [ 887.157738] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 887.157772] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 887.157802] ? lock_release+0xc8/0x270 [ 887.157831] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 887.157870] ? blkdev_common_ioctl+0x1c3/0x2830 [ 887.157940] ? check_path.constprop.0+0x50/0x50 [ 887.157980] ? __fget_files+0x34/0x3b0 [ 887.158018] ? find_held_lock+0x2b/0x80 [ 887.158054] ? __fget_files+0x203/0x3b0 [ 887.158095] ? __pfx_lo_ioctl+0x10/0x10 [ 887.158124] blkdev_ioctl+0x365/0x6d0 [ 887.158151] ? __pfx_blkdev_ioctl+0x10/0x10 [ 887.158180] ? selinux_file_ioctl+0xb9/0x280 [ 887.158218] ? __pfx_blkdev_ioctl+0x10/0x10 [ 887.158249] __x64_sys_ioctl+0x18f/0x210 [ 887.158286] do_syscall_64+0xbf/0x420 [ 887.158320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 887.158346] RIP: 0033:0x7f0eb800f8d7 [ 887.158366] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 887.158390] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 887.158415] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb800f8d7 [ 887.158432] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 887.158448] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 887.158463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 887.158478] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 887.158516] [ 887.192979] Invalid ELF header len 9 [ 887.193585] loop0: detected capacity change from 0 to 32792 [ 887.259631] Invalid ELF header len 9 [ 887.349924] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 887.354175] EXT4-fs (loop0): get root inode failed [ 887.354962] EXT4-fs (loop0): mount failed 04:07:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 27) 04:07:31 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x200000c, 0x10, r0, 0x7ca5000) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = epoll_create1(0x0) pread64(r2, &(0x7f0000000000)=""/19, 0x13, 0x2) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) 04:07:31 executing program 7: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) dup(r0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000200)="7f4bc03299c27c49ba2a7aa44f95caed25827961602755822c4916c562b609c54494c35a08652b2e776f053b20303da02ad4b944a3dca8681d0369a89257c9965dbb46e0fa1113ce8c42e44fe7e94aba9d07cea10f6b51b0c7f47a815b5eb936665472d98a27e43e17ce42079ab275cdc98a507047f09e9adf49b6411e5017bd0671cf1e9f", 0x85, r1) keyctl$chown(0x4, r2, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) 04:07:31 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x3, 0x0, 0x0, 0x0, 0x2, 0x2010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) perf_event_open(&(0x7f0000000240)={0x128979814e6e7008, 0x80, 0x2, 0x5, 0x81, 0x1, 0x0, 0x3225, 0x880, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x1, 0x0, 0x0, 0xe0d1, 0x10000, 0x861, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) finit_module(r0, 0x0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x63, 0xaf, 0x9, 0x7f, 0x0, 0x0, 0x409, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6e3e, 0x4, @perf_config_ext={0x7fff, 0x7}, 0x1000, 0x6, 0x7d, 0x0, 0x7, 0xfff, 0x9e, 0x0, 0xd5, 0x0, 0x7ff}, 0xffffffffffffffff, 0x2, r3, 0x1) 04:07:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:07:31 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd078f9220aa2d0e9, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = socket$inet(0x2, 0x6, 0x7) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0xfffffffffffffffb, 0xfff}) ftruncate(r0, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'macsec0\x00'}) close_range(r0, r0, 0x0) finit_module(r0, 0x0, 0x0) 04:07:31 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r4, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r2, r3, r4}}, 0x71) keyctl$chown(0x4, r0, r1, r3) 04:07:31 executing program 5: timer_create(0x3, 0x0, &(0x7f0000000100)=0x0) timer_create(0x2, &(0x7f0000000380)={0x0, 0x8, 0x0, @thr={&(0x7f0000000280)="cf26510fb0d4757ef921fff71703cdf6d224f3ff7e846d860e4e6ebf731b6b6d45229bacbaa824ed480f47c4ccd60426282e38d7da583a8c5e6c07d8855fcbde66b1849beff6f7b96e4cc7d70e561aff81291c8b6229b74f785dfd1cc10ac8f0416ab4e020ddbd4c01ac7affb3dc", &(0x7f0000000300)="f3373526bd6d861eb72fa0c9d0722366031881e83de7ec22da2f2d3bbb70d3c0b681e16724bbd3d762c1925f73fbdd423412678f47e177dc0d62998d5728ddebb20657f4c8ba4336aefc5fad3cc944137531d239a6c846575b6001f1ddda13ec3b37a80267bebaf219a4ed"}}, &(0x7f00000003c0)=0x0) timer_delete(r1) timer_settime(0x0, 0x0, &(0x7f0000000400)={{}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, r2+60000000}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x3938700}}, &(0x7f0000000240)) timer_delete(0x0) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f0000000480)={{r3, r4+60000000}, {0x77359400}}, &(0x7f00000004c0)) timer_settime(r1, 0x0, &(0x7f0000000500)={{}, {0x77359400}}, &(0x7f0000000540)) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f00000000c0)={{r5, r6+10000000}}, &(0x7f00000001c0)) clock_gettime(0x6, &(0x7f0000000000)) mq_timedsend(0xffffffffffffffff, &(0x7f00000005c0)="7bd6dfdca67dc3654388a38c5322efbb1cbdf557527ba031065925b6d532c10999e701e1fbc1a352c77d2a41c06b510d393f1a7019f2024bedf3a2ee1270fcf209df8189c1252fac89dcafe3500cabb031cfdcba7d068c69f643ec55f03af1010ffc13940df838108f5c5aaa8166cd1fa62688163067e7ac250af77d1b516cd15f3038c962ef", 0x86, 0x7, &(0x7f0000000680)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000780)=""/181, 0xb5}, {&(0x7f00000006c0)=""/63, 0x3f}, {&(0x7f0000000880)=""/110, 0x6e}, {&(0x7f0000000900)=""/13, 0xd}, {&(0x7f0000000940)=""/56, 0x38}, {&(0x7f0000000980)=""/4096, 0x1000}], 0x6, &(0x7f0000001a00)=""/23, 0x17}, 0x400}, {{&(0x7f0000001a40)=@generic, 0x80, &(0x7f0000002000)=[{&(0x7f0000001ac0)=""/197, 0xc5}, {&(0x7f0000001bc0)=""/200, 0xc8}, {&(0x7f0000001cc0)=""/17, 0x11}, {&(0x7f0000001d00)=""/245, 0xf5}, {&(0x7f0000001e00)=""/177, 0xb1}, {&(0x7f0000001ec0)=""/183, 0xb7}, {&(0x7f0000001f80)=""/107, 0x6b}], 0x7, &(0x7f0000002080)=""/117, 0x75}, 0x2}, {{&(0x7f0000002100)=@nfc_llcp, 0x80, &(0x7f0000002340)=[{&(0x7f0000002180)=""/157, 0x9d}, {&(0x7f0000002240)=""/217, 0xd9}], 0x2, &(0x7f0000002380)=""/141, 0x8d}, 0x2}], 0x3, 0x2000, &(0x7f0000002500)={0x77359400}) [ 899.195939] loop0: detected capacity change from 0 to 32792 [ 899.242405] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 899.253523] EXT4-fs (loop0): get root inode failed [ 899.254349] EXT4-fs (loop0): mount failed 04:07:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:07:31 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8404}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = request_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='keyring\x00', r0) add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="6e8c5f78bbce9632301b2d2e759019bff1619b589bac763de2cb315229aa20366ee8ef87a4fbcf5d798ebc252eec873a8e05d7cbb8766be4f223256e0041bfac7b5496479d8a06462a14010e4f34ca70a763c316ade7dd330df68272e8894d2300840ef063eed52f483a8765058736383fd288b7cb9e97da93d47b74f00f1cd578ec212dfab1fff4e3fb810a67dc8e3c7a9160a716d7b805b28085d7580a5c78f95a2c60704b0de7cf2825d3235892810aac259542140fe55c3295fdd8a18de4e87842372c2cbdb9bc2f0c4fe1aee7736ea757a12fdc3e6cfe6b901f10d1b086f37e3dc2847f684ffdea1f067f37d019d21bf1b9b8b89c2a0c", 0xf9, r1) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 28) 04:07:31 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) add_key(&(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000000080)="1cf46240f4b7d2746b2b3bbc1df712b781f11f59024edb478d86b6e7bab0a41a6fecef59cab32adcb26cbdcc97f2990590dc0bd56a13", 0x36, r0) add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000280)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "e5b6e337a615274a4585adffc2f5ac0b8b5e00ff0539261c48e067dff15a4c5316172dc84cc1097058462c11aec5372779129bbc0b73ab603b329a0b62c149b1", 0x3f}, 0x48, 0xfffffffffffffffe) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r2, 0x0) keyctl$chown(0x4, r1, r2, 0xee01) add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000200)="a29571190c931cd7a58c5419013c96f161c8b2cd90d834f768a94487c21b903acebdc570bb48d6da4fa4ec69f8ec0e249c5628b307d691d2cef80f4a87b39e7cbe5740702b0788ef6e3cd5d16af2a98ff9c3ca434fe5664d617b24d0b6438ac2e79f6e19ddb46332952f4d9164be7bf88ac3c9ec6a066ad43d5e68ccd7be97", 0x7f, r0) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:31 executing program 6: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x3ff, 0x101) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) finit_module(r3, 0x0, 0x6) poll(&(0x7f0000000200)=[{0xffffffffffffffff, 0x80}, {r0, 0x40}, {0xffffffffffffffff, 0x2530}, {0xffffffffffffffff, 0x2080}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0xa004}, {r1, 0x200}, {r2, 0x4004}, {0xffffffffffffffff, 0x420}, {r3, 0xc101}], 0xa, 0x3) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"/4337], &(0x7f0000000040)=0x1024) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x81000) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r6 = openat$cgroup_ro(r5, &(0x7f00000000c0)='memory.events.local\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) keyctl$chown(0x4, r4, 0xee00, 0xee00) keyctl$chown(0x4, r4, 0x0, 0x0) 04:07:31 executing program 2: perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000000)={0x10000000}) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) 04:07:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) [ 899.590996] loop0: detected capacity change from 0 to 32792 04:07:31 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) [ 899.658200] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 899.667118] EXT4-fs (loop0): get root inode failed [ 899.668133] EXT4-fs (loop0): mount failed 04:07:31 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x4) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) 04:07:31 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "d29542cda5de44c82b90f1112933d2202e2f7229e0c0cc9389ed66c021c326f392e27e9cb98db3cd704a84d7473dd1c605cb0601778ead51cc4ba83542df632f", 0x40}, 0x48, r0) add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="9bcc044f58abbce96f793f6a1cac91ebc5bd7d330b6f8292c64bd728550520da1de17b83eb19df956a8a699b9e195c5225a22e41212eae8bea7be3de8c83dc05fa81dff803987d95d71a", 0x4a, r1) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:31 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x21081, 0x0) pipe(&(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r2, 0x0) r3 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r5, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r3, r4, r5}}, 0x71) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b80)=[{{&(0x7f0000000400)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000480)="50d46be4bc6dadf9f96552166e76eae4b619b62f6bdd8b3f57f95b8ab9d4a439764ad43868f393d74a8bdcb9f986f94e233e08781da436dd6566", 0x3a}, {&(0x7f00000004c0)="fbf77da56aee4958d8a91c2450479e52f3e09e6b5c7c27fe2a4e2e937695", 0x1e}, {&(0x7f0000000500)="5a6f5bb565cafaeccd4e88ecab89afd0365f3e0f956e2b309385868548798202613d01b7d6760c616334ec32cda94cfc8aab7b", 0x33}, {&(0x7f0000000540)='d', 0x1}, {&(0x7f0000000580)="c0a66bd2", 0x4}, {&(0x7f00000005c0)="3b0ec96ace8f7b4d520489d19b789fd67e2118e3b1adde7c45f9d24f36813b3d42eeb7dec992c43b485dbff830a80a01f568ff1030c23d3b057c3e7425fea5faab6bcc5ca9b21fa9ba8ad755367c689b9be442ab352c31d15e7a2d150f2ca432ddda4d0683de5a04d0b9ec1256dece5c66079ae6ba430ab741c373ff27bd75a374d7d981c4044697b92706a27bd0009d7a9317f789d19d8222e9b97505c418f2b528975c37e163bbf93de610e14d44d83f39f4ae6736f1d5595682cc459116d6574fed3706891bd767ddc0fe7fc044971aa8", 0xd2}], 0x6, &(0x7f0000000a40)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r1, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r4}}}], 0x138, 0x4}}], 0x1, 0x84) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0xfd, 0x0, 0x0, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4250, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r8 = dup3(r6, r7, 0x0) r9 = syz_open_dev$vcsu(&(0x7f0000000380), 0x3, 0x181000) getsockopt$packet_buf(r9, 0x107, 0x6, 0x0, &(0x7f0000000340)) sendmsg$NFQNL_MSG_VERDICT_BATCH(r8, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="00000700000409"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000005) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000080)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)=ANY=[]) 04:07:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) 04:07:31 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0x4, 0x40, 0x8, 0x0, 0x0, 0x20000, 0xc, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xf1e, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x8f0e, 0x80, 0x7f, 0x7, 0x37d6b432, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xd, r1, 0x3) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) keyctl$chown(0x4, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r2, 0x1) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 29) 04:07:41 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) fsetxattr(r0, &(0x7f0000000000)=ANY=[@ANYRES64=r1], &(0x7f0000000040)='/}(,\x00', 0x5, 0x3) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) 04:07:41 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000003c0)=""/4096) 04:07:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:07:41 executing program 1: perf_event_open(&(0x7f0000000340)={0x4, 0xffffffffffffff0a, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4049a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0xffffffffffff7fff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) finit_module(r3, 0x0, 0x6) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) finit_module(r2, 0x0, 0x6) ftruncate(r4, 0xffffffffffffff62) finit_module(r3, 0x0, 0x2) 04:07:41 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0xfffffffffffffff9) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) r3 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "df7dbb77ca0ad38c56892042e9de37ca2da9790b7bd29a2351dccc8659de9402c52fc06886b587f9050911fe589ea44d9debc327bc9e9e28f5dfdc06ec0bbe1f", 0x18}, 0x48, r1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r3) setresuid(0x0, r2, 0x0) keyctl$chown(0x4, r1, r2, 0xee01) 04:07:41 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) 04:07:41 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = getpid() setpriority(0x0, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x82}}, './file0\x00'}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x6, 0x4, 0x9, 0x0, 0x7, 0x40001, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000140), 0x19}, 0x24, 0xce19, 0x0, 0x9, 0x3, 0x1f, 0x9, 0x0, 0x3, 0x0, 0xffa}, r1, 0xd, r2, 0x2) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) r4 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="81e9bd83d5be8ad3eebe36979c4a83ee6eb7cb3ec98dcc03a701612f0bb240417a15cd7b63952d80f8bfdc7446b858bf2619b696788c3d0626a1d12a8dc4b2c07bdcba86b11d7f7be95fc7c78524e53290182fb4e8c64d2d010a4a75fd98b270b592ab7b41c9a5d2793d93862229fcddfa7be6f85b7626ea87da92212b953b429916ba0186e1d1", 0x87, r0) keyctl$KEYCTL_MOVE(0x1e, r0, r3, r4, 0x1) [ 909.734414] loop0: detected capacity change from 0 to 32792 04:07:41 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) [ 909.776259] Invalid ELF header len 9 04:07:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:07:41 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = getpid() setpriority(0x0, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4, 0xfff}}, './file0\x00'}) r4 = gettid() ptrace(0x11, r4) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x8, 0x81, 0x8, 0x4, 0x0, 0x7f, 0x8404, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100000, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x100, 0x8, 0xff, 0x6, 0x8, 0x4, 0xfffe, 0x0, 0x0, 0x0, 0x6}, r2, 0x2, r3, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@getsa={0x28, 0x12, 0x401, 0x0, 0x0, {@in6=@private1, 0x0, 0x0, 0xff}}, 0x28}}, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r5, 0xee00, 0xee00) keyctl$chown(0x4, r5, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) [ 909.781774] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 909.787010] EXT4-fs (loop0): get root inode failed [ 909.787490] EXT4-fs (loop0): mount failed [ 909.816948] Invalid ELF header len 9 04:07:42 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, 0x0, &(0x7f0000000080)=@keyring={'key_or_keyring:', r0}) 04:07:42 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="686737499d74"}, 0x14) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r1, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r0}, @GTPA_LINK={0x8, 0x1, r4}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_TID={0xc, 0x3, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000080}, 0x44880) r5 = syz_open_dev$vcsu(&(0x7f00000002c0), 0x1ff, 0x400a42) sendmsg$NL80211_CMD_DISCONNECT(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x0, 0x4b}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x2c}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x39}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xe}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x21}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x21}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x2d}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x3d}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x10}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x33}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x0) 04:07:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 30) 04:07:42 executing program 7: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'veth1_to_hsr\x00'}) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x7a, 0x40, 0x0, 0x3f, 0x0, 0x0, 0x2000, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1, @perf_config_ext={0x5, 0x4}, 0x4020, 0x0, 0x72, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffb7ffe, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x1dcf1401f817bbd9) r2 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2, 0x8000) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) r4 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f200822232425262728292b2b2c2d2e2f303132333435363738393a3b3c3d3e3f40fd14c6d3c03eb044ed34cea231a462ed4f39c8948964672cad60c607cdc269f142b556"], 0x48, r3) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=r6, @ANYBLOB="000000002e2f66696c653d001438d97d4e226693dedc856ee3ee22e4b974deb686f327fc7ca1d21050652acb3156068475fc55577a166d6915bbe169798d1e5559d2d4c55ce7732e21b508028040b6d874a1ebf14b55d9efbb6a9ba9ac27faa7fc9e3831a7a73293e45c7965ee3afb245ac670def0971ebdf3a576c855e5467a7677b3290a6bc183fb77f539c9c210105041f98c1511b060de020d90880a2b3ee9f2581553e6a654222ce9eeb17e5f772a4ec1b2ee770925127749d7f7e2e34dc66f93b06096579bfd358f2ac77647930e57a1552a90f0634df2c93c5cefb7008b600cc4"]) pidfd_getfd(r8, r5, 0x0) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000002c0)={r7, 0x1, 0x6, @multicast}, 0x10) keyctl$chown(0x4, r4, 0xee01, 0xee01) keyctl$chown(0x4, r3, 0x0, 0x0) [ 910.014094] FAULT_INJECTION: forcing a failure. [ 910.014094] name failslab, interval 1, probability 0, space 0, times 0 [ 910.015242] CPU: 1 UID: 0 PID: 8038 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 910.015262] Tainted: [W]=WARN [ 910.015266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 910.015273] Call Trace: [ 910.015277] [ 910.015282] dump_stack_lvl+0xfa/0x120 [ 910.015308] should_fail_ex+0x4d7/0x5e0 [ 910.015335] ? __kernfs_new_node+0xd3/0x930 [ 910.015356] should_failslab+0xc2/0x120 [ 910.015370] kmem_cache_alloc_noprof+0x80/0x760 [ 910.015398] ? __kernfs_new_node+0xd3/0x930 [ 910.015415] __kernfs_new_node+0xd3/0x930 [ 910.015431] ? __lock_acquire+0x451/0x2250 [ 910.015451] ? __pfx___kernfs_new_node+0x10/0x10 [ 910.015471] ? lock_acquire+0x15e/0x2d0 [ 910.015485] ? kernfs_root+0x23/0x2a0 [ 910.015503] ? find_held_lock+0x2b/0x80 [ 910.015524] ? kernfs_root+0xee/0x2a0 [ 910.015538] ? lock_release+0xc8/0x270 [ 910.015550] ? lock_is_held_type+0x9e/0x120 [ 910.015567] kernfs_new_node+0x13c/0x1e0 [ 910.015587] __kernfs_create_file+0x55/0x360 [ 910.015611] sysfs_add_file_mode_ns+0x21c/0x430 [ 910.015627] ? __pfx_dev_attr_store+0x10/0x10 [ 910.015645] internal_create_group+0x662/0xeb0 [ 910.015667] ? __pfx_internal_create_group+0x10/0x10 [ 910.015682] ? blk_validate_limits+0xc27/0x15c0 [ 910.015698] ? lock_is_held_type+0x9e/0x120 [ 910.015713] loop_configure+0xc46/0x15a0 [ 910.015748] ? __pfx_loop_configure+0x10/0x10 [ 910.015772] ? avc_has_extended_perms+0x107/0xf20 [ 910.015785] ? find_held_lock+0x2b/0x80 [ 910.015802] ? avc_has_extended_perms+0x23b/0xf20 [ 910.015814] ? lock_release+0xc8/0x270 [ 910.015829] lo_ioctl+0x66d/0x1ca0 [ 910.015846] ? __pfx_lo_ioctl+0x10/0x10 [ 910.015859] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 910.015876] ? lock_acquire+0x15e/0x2d0 [ 910.015888] ? __virt_addr_valid+0x1c6/0x5d0 [ 910.015903] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 910.015920] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 910.015934] ? lock_release+0xc8/0x270 [ 910.015948] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 910.015967] ? blkdev_common_ioctl+0x1c3/0x2830 [ 910.015999] ? check_path.constprop.0+0x50/0x50 [ 910.016018] ? __fget_files+0x34/0x3b0 [ 910.016037] ? find_held_lock+0x2b/0x80 [ 910.016053] ? __fget_files+0x203/0x3b0 [ 910.016072] ? __pfx_lo_ioctl+0x10/0x10 [ 910.016085] blkdev_ioctl+0x365/0x6d0 [ 910.016097] ? __pfx_blkdev_ioctl+0x10/0x10 [ 910.016110] ? selinux_file_ioctl+0xb9/0x280 [ 910.016128] ? __pfx_blkdev_ioctl+0x10/0x10 [ 910.016142] __x64_sys_ioctl+0x18f/0x210 [ 910.016160] do_syscall_64+0xbf/0x420 [ 910.016176] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 910.016188] RIP: 0033:0x7f0eb800f8d7 [ 910.016198] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 910.016210] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 910.016221] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb800f8d7 [ 910.016229] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 910.016236] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 910.016244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 910.016251] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 910.016268] [ 910.052777] loop0: detected capacity change from 0 to 32792 [ 910.063623] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 910.065978] EXT4-fs (loop0): get root inode failed [ 910.066435] EXT4-fs (loop0): mount failed 04:07:52 executing program 2: syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc9, 0x1b}, "622e3cf016bff435bab07b155076239fd8609c2bc9f44d801a0700"}, 0x1f) r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000003c0)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x220402, 0xa7, 0x3}, 0x18) ftruncate(r0, 0x4) finit_module(r1, 0x0, 0x6) 04:07:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 31) 04:07:52 executing program 6: ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x1) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) 04:07:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0xfffffffffffffe43) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:07:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:07:52 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x3, @private2}, 0x1c) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) pwrite64(r1, &(0x7f0000000000)="799d7fefd071609847e3a68ae31ad46310063ea3eb887283939a7ee570756a0c2de74e77d0efe6aa6e970a6e36c717791b6bcb1196e593babbe8991b4384139e9a8dd7f230109b8f13914f5fc04deebe5e46f5978f4d1279b2ccdd1de7953e2febf86232f84fab6a0ac336130b865e7cc59d05560755c1", 0x77, 0x9) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) 04:07:52 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x1a) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) r5 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) dup3(r5, r6, 0x0) sendmsg(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="ea6bfa1ce5af67a72e", 0x9}], 0x1, &(0x7f0000000200)=[{0x58, 0x108, 0x0, "be049c8ea1bcda9e8a593fcae7bb07e9fc76a6a9c6fd1699ecfe50a5e74e53ba74ec7e035f2b38e0c2629950fdf741de6a85f0b4ece206acf4b4d2a1d0b6394bc6d6b0"}, {0xa8, 0x108, 0x1000000, "c18829e3f903d535d4ce41567542a173f4c4cfb9d361e7882170e9e0bc01295cb574a17b813e46cc31f9e9ebeb03f044e2e89f8c8d3eb06ee6925ab27915f5b32b776f51cdddca06fc1ad40874e5c0262ebe2f7b700e14d7c1a4c6e1ddc284ea05fef78cf0239cc60287036ba9d3ff383809bb843ccf14100e685c958d2dc4f05bc6b57de49748967d9b6fcdbd2a80e5c35bd13d3d35"}], 0x100}, 0x20000000) finit_module(r4, 0x0, 0x6) pidfd_getfd(r0, r4, 0x0) r7 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r7, 0xee00, 0xee00) keyctl$chown(0x4, r7, 0x0, 0x0) 04:07:52 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) getsockname(r2, &(0x7f0000000000)=@tipc=@name, &(0x7f0000000080)=0x80) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) [ 920.129761] Bluetooth: hci1: SCO packet for unknown connection handle 201 [ 920.136926] Bluetooth: hci1: SCO packet for unknown connection handle 201 [ 920.146297] loop0: detected capacity change from 0 to 32792 [ 920.178021] Invalid ELF header len 9 04:07:52 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='keyring\x00', r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000140)='logon\x00', &(0x7f0000000200)='*\\^\x8d\x00') keyctl$chown(0x4, r0, 0xee00, 0xee00) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$chown(0x4, r0, 0x0, 0x0) 04:07:52 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000003c0)={0x0, 0x3, 0x1, [0x8000, 0x24000000000, 0x7, 0x1f, 0x6], [0xfffffffffffffc01, 0x80000000, 0x0, 0x1, 0x8, 0x0, 0x0, 0x1, 0x10001, 0x0, 0x8001, 0x1, 0x200, 0xaa57, 0x3, 0xff, 0x5, 0xfff, 0x2, 0x1, 0x1, 0x8, 0xa1, 0x6, 0x70079642, 0x13c6, 0x3, 0x1, 0x879, 0x0, 0x0, 0x8, 0x3ff, 0x3f, 0x0, 0x5, 0x4, 0x20000000, 0xd3, 0x77c2, 0x40, 0x1f, 0x1815, 0xf0b, 0x3ff, 0x4, 0xef88, 0x3, 0x100000000, 0x3, 0xfffffffffffffffd, 0xee3, 0x7, 0x580, 0x2, 0x100000001, 0x1ff, 0xfffffffffffffff9, 0xffffffffffff0000, 0xee, 0x7, 0x2, 0x4, 0x10000, 0x1f, 0x100000001, 0x8, 0x80000001, 0x2, 0x7fffffff, 0x100000000, 0x200, 0x8, 0x6, 0x0, 0x7fffffff, 0x5, 0x401, 0x7fffffff, 0x0, 0x2, 0x504, 0x3, 0x6, 0x1, 0x400, 0x3, 0x5b, 0x7, 0x0, 0x5, 0xe5d, 0x3, 0x10001, 0x30c, 0x7, 0x1000, 0xffffffffffffaa8a, 0x80000001, 0x7fff, 0x80, 0xfffffffffffff159, 0x81, 0x4, 0xfffffffffffffffc, 0xfff, 0x80000000, 0x4, 0x7, 0x3, 0x6, 0x0, 0x401, 0x3, 0x3, 0x1000, 0x566f6fc5, 0x7fff, 0x5, 0x80000000, 0x6]}) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000800)={0x1, 0x1, @start={r2, 0x1, "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", "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"}, [0x7, 0x9ef, 0x3, 0x9, 0x7, 0x5, 0x100, 0x1, 0x100, 0x8, 0x40, 0x7, 0x7, 0x7, 0x1ff, 0x8, 0x40, 0xc1b9, 0x3, 0x8, 0x8, 0x7fffffff, 0x584, 0x5, 0x5, 0x1d6, 0x10001, 0x2e, 0x9, 0x1, 0x4, 0x2, 0x8, 0x7ff, 0x80000000, 0x5, 0x8b, 0x100, 0x7, 0x42e, 0xffffffffffffffff, 0x1ff, 0xfc00, 0x6, 0x97d, 0x5, 0xed8, 0x3, 0x5d9, 0xa2, 0x1ff, 0x6, 0x7, 0x0, 0x10001, 0x3ff, 0xd30d, 0x9, 0xa4a, 0x1, 0xfff, 0x8000, 0x3, 0x100000000]}) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) [ 920.267020] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 920.282413] EXT4-fs (loop0): get root inode failed 04:07:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) [ 920.283352] EXT4-fs (loop0): mount failed 04:07:52 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x7a, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="161dd9034b64f7b50ed7978e694d813297db3b88653f13f418ccfae6d9d1112a9b09d2b76e5ae184ea8f352b382bd686154e6b99ca48166dedbecaf8af8312ac10c817f09c5764006215388d35c33f9c5c059161475915f1e05c1e3c35b7647672a478a6eb44802f75b9a93ee02a85bd3630b7b1b57fa07f14858a8ceab9398580d46b7bc6068c8d8e53ad92eed2800e2515de34b110f9c7f340b69588fab20e5f38b54447b2496ae832bb3b423ad012bbb12728ce20c5dd63d8a5c7bae369baa479a2b711af7abed7d8e74c9e02c7fbeffce7f0f2f6639fbd84bb8d02ab82e547f8c4c8bab600d33a7fdf164dd3404384feb66ec803bbe2c9303e5a754b231e66c7d993ccb18eaa0542777779bce2cd679789bd1d2dd7ca769c9c19205f4f895664ea00bce55b6a5b583abec903dda964cccb45ae874f3d2fee5fb8604f8cc80819ba1987cd8506ae9e3a672d8074d81d2f4043ec72e5a8d20c1a33b406683279afbe2a04d78bcbb546a4ed2b"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x0) [ 920.457045] Invalid ELF header len 9 04:08:03 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) recvmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/109, 0x6d}, {&(0x7f0000000280)=""/113, 0x71}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f00000003c0)=""/82, 0x52}, {&(0x7f0000000440)=""/173, 0xad}, {&(0x7f0000000300)=""/13, 0xd}, {&(0x7f0000000500)=""/156, 0x9c}, {&(0x7f00000005c0)=""/205, 0xcd}, {&(0x7f00000006c0)=""/234, 0xea}], 0x9, &(0x7f0000000880)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x108}, 0x40010043) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0xd1, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000080), 0x1}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) 04:08:03 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x619}, 0x40004}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x3e, 0x40, 0x1, 0xee, 0x0, 0x40, 0x20000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f00000003c0), 0x8}, 0x8000, 0x7, 0x2, 0x3, 0x7, 0x7, 0x6, 0x0, 0xb51, 0x0, 0x5}, 0xffffffffffffffff, 0x2, r0, 0x3) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) r2 = creat(&(0x7f0000000000)='./file0\x00', 0xb) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000100)={'wlan1\x00', &(0x7f0000000000)=@ethtool_stats={0x41}}) finit_module(r1, 0x0, 0x6) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) sendfile(r0, r4, &(0x7f0000000480)=0x9, 0xfff) r5 = accept(r2, &(0x7f0000000200)=@in6, &(0x7f0000000040)=0x80) fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000000280), &(0x7f00000002c0), 0x2, 0x3) 04:08:03 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) openat(r2, &(0x7f0000000000)='./file0\x00', 0x201, 0xc0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) 04:08:03 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x452014bb, 0x7, 0xfffffffffffffffe}) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x0) 04:08:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 32) 04:08:03 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) 04:08:03 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:08:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) [ 930.983671] FAULT_INJECTION: forcing a failure. [ 930.983671] name failslab, interval 1, probability 0, space 0, times 0 [ 930.985498] CPU: 0 UID: 0 PID: 8102 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 930.985533] Tainted: [W]=WARN [ 930.985540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 930.985552] Call Trace: [ 930.985560] [ 930.985568] dump_stack_lvl+0xfa/0x120 [ 930.985602] should_fail_ex+0x4d7/0x5e0 [ 930.985636] ? __kernfs_new_node+0xd3/0x930 [ 930.985662] should_failslab+0xc2/0x120 [ 930.985685] kmem_cache_alloc_noprof+0x80/0x760 [ 930.985731] ? __kernfs_new_node+0xd3/0x930 [ 930.985756] __kernfs_new_node+0xd3/0x930 [ 930.985781] ? __lock_acquire+0x451/0x2250 [ 930.985810] ? __pfx___kernfs_new_node+0x10/0x10 [ 930.985843] ? lock_acquire+0x15e/0x2d0 [ 930.985865] ? kernfs_root+0x23/0x2a0 [ 930.985891] ? find_held_lock+0x2b/0x80 [ 930.985922] ? kernfs_root+0xee/0x2a0 [ 930.985947] ? lock_release+0xc8/0x270 [ 930.985968] ? lock_is_held_type+0x9e/0x120 [ 930.985999] kernfs_new_node+0x13c/0x1e0 [ 930.986035] __kernfs_create_file+0x55/0x360 [ 930.986061] sysfs_add_file_mode_ns+0x21c/0x430 [ 930.986091] ? __pfx_dev_attr_store+0x10/0x10 [ 930.986122] internal_create_group+0x662/0xeb0 [ 930.986160] ? __pfx_internal_create_group+0x10/0x10 [ 930.986188] ? blk_validate_limits+0xc27/0x15c0 [ 930.986216] ? lock_is_held_type+0x9e/0x120 [ 930.986243] loop_configure+0xc46/0x15a0 [ 930.986297] ? __pfx_loop_configure+0x10/0x10 [ 930.986342] ? avc_has_extended_perms+0x107/0xf20 [ 930.986365] ? find_held_lock+0x2b/0x80 [ 930.986395] ? avc_has_extended_perms+0x23b/0xf20 [ 930.986417] ? lock_release+0xc8/0x270 [ 930.986444] lo_ioctl+0x66d/0x1ca0 [ 930.986476] ? __pfx_lo_ioctl+0x10/0x10 [ 930.986500] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 930.986530] ? lock_acquire+0x15e/0x2d0 [ 930.986552] ? __virt_addr_valid+0x1c6/0x5d0 [ 930.986578] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 930.986606] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 930.986631] ? lock_release+0xc8/0x270 [ 930.986656] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 930.986689] ? blkdev_common_ioctl+0x1c3/0x2830 [ 930.986748] ? check_path.constprop.0+0x50/0x50 [ 930.986782] ? __fget_files+0x34/0x3b0 [ 930.986814] ? find_held_lock+0x2b/0x80 [ 930.986845] ? __fget_files+0x203/0x3b0 [ 930.986879] ? __pfx_lo_ioctl+0x10/0x10 [ 930.986904] blkdev_ioctl+0x365/0x6d0 [ 930.986927] ? __pfx_blkdev_ioctl+0x10/0x10 [ 930.986951] ? selinux_file_ioctl+0xb9/0x280 [ 930.986982] ? __pfx_blkdev_ioctl+0x10/0x10 [ 930.987007] __x64_sys_ioctl+0x18f/0x210 [ 930.987039] do_syscall_64+0xbf/0x420 [ 930.987069] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 930.987090] RIP: 0033:0x7f0eb800f8d7 [ 930.987107] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 930.987127] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 930.987148] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb800f8d7 [ 930.987163] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 930.987176] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 930.987188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 930.987201] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 930.987233] [ 931.109043] loop0: detected capacity change from 0 to 32792 04:08:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) 04:08:03 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0xee01, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:03 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x1, 0x20}, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:03 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:08:03 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005440)=[{{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000002700)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/45, 0x2d}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/138, 0x8a}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000002480)=""/115, 0x73}, {&(0x7f0000002500)=""/226, 0xe2}, {&(0x7f0000005600)=""/214, 0xd6}], 0x8, &(0x7f0000005700)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000000000000000fc00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000b3216c58469e070e6b", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x178}}, {{&(0x7f0000002900)=@abs, 0x6e, &(0x7f0000002b00)=[{&(0x7f0000002980)=""/59, 0x3b}, {&(0x7f0000002a00)=""/63, 0x3f}, {&(0x7f0000002a00)}, {&(0x7f0000002a40)=""/156, 0x9c}], 0x4, &(0x7f0000002b40)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000002bc0)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000002c40)=""/203, 0xcb}, {&(0x7f0000002d40)=""/114, 0x72}, {&(0x7f0000002dc0)=""/49, 0x31}, {&(0x7f0000002e00)=""/192, 0xc0}, {&(0x7f0000002ec0)=""/252, 0xfc}], 0x5}}, {{&(0x7f0000003040)=@abs, 0x6e, &(0x7f0000004280)=[{&(0x7f00000030c0)=""/21, 0x15}, {&(0x7f0000003100)=""/31, 0x1f}, {&(0x7f0000003140)=""/4096, 0x1000}, {&(0x7f0000004140)=""/247, 0xf7}, {&(0x7f0000004240)=""/6, 0x6}], 0x5, &(0x7f0000004300)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000004340), 0x6e, &(0x7f0000005400)=[{&(0x7f00000043c0)=""/54, 0x36}, {&(0x7f00000058c0)=""/4111, 0x100f}], 0x2}}], 0x5, 0x60, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x9, 0x4, 0x7f, 0x1a, 0x0, 0x3, 0x10000, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x4, @perf_config_ext={0x3b68, 0x200}, 0x40800, 0x465, 0x4, 0x0, 0x0, 0x20, 0x6, 0x0, 0x5, 0x0, 0x3}, 0xffffffffffffffff, 0x2, r2, 0x1) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) pwrite64(r4, &(0x7f0000002600)="83f879e8450018fae71375cb8c3795c207a138353ccb82b147312ec1ce968e516593ca84b384d85e168c53d49a01e2700bf5818b7f9b280eda2b22a0e236569d44a57464a582ae9009c751e5cef4a09570ff5c27d5c216d3ff", 0x59, 0x10000) ftruncate(r4, 0x9) write(r1, &(0x7f0000005580)="9673ff54b2128355daeb5159dffff407402f8cdbe6dcb25d1eb18a507bb4bfff1aa40988463a57dc7c997d4577cf8b6b2d8964b80319b769030a0fb6d3f39ce80ef9cbc7510ac04b667ae25d4224c78fe36ef38602351f2bfd71455359a6", 0x5e) fcntl$addseals(r0, 0x409, 0x1) r5 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r5, 0x9) finit_module(r5, 0x0, 0x6) tee(r5, r3, 0x1, 0x2) finit_module(r4, 0x0, 0x6) [ 931.201925] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 931.226557] EXT4-fs (loop0): get root inode failed [ 931.227562] EXT4-fs (loop0): mount failed [ 931.280087] Invalid ELF header len 9 04:08:03 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x5920, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) [ 931.318746] Invalid ELF header len 9 04:08:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 33) 04:08:03 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) [ 931.505855] loop0: detected capacity change from 0 to 32792 [ 931.522468] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 931.532953] EXT4-fs (loop0): get root inode failed [ 931.533875] EXT4-fs (loop0): mount failed 04:08:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 34) 04:08:15 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000140), &(0x7f0000001700)={'syz', 0x0}, &(0x7f0000001740)="df514c6d15d7ca1f2030329f08884cfba5d697bd60a7e6ae477005804851d52609d61ceaf1fe22ad46ba3dc940627fe331072fe97ae40131104f2567a70d70b24b2de3b0e141f8b9c752d291c0365776ef676ba46782148c262ccc86e1667083f8a3b68c152e55aa78839b25", 0x6c, r1) keyctl$chown(0x4, r1, 0xee00, 0xee00) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0xfffffffffffffff9, 0x4, 0x9}) pwritev2(r2, &(0x7f00000015c0)=[{&(0x7f0000000200)="ed93ce42643f13a7d928f75b7a01ed399b915865a51da3e9665e3218da1af7c03ce4768884da730d9e347ea27a0aa4ff650460796a4005187b6d478abe8f032c1e0309ef95a68e6434d391129e50d724863395b9f2dc766e940a6a918a5f75475e26ae49798a91f28d94e53480170cc06826424e2e8135669a6e71b484ae982a60de6d752304ff", 0x87}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000100)="f719d6cafc25113d3f4f87b1d4cd7cee9d96", 0x12}, {&(0x7f00000013c0)="3c68f886b48ab3ea800e08622ed3bbed38ce9e107aa98603d46c410239717eb65677a88e2c2d399b1b336ce7a090f07550031cf97a1824cea0d32f9327d4348af62ef13b050d1dbc32971c14dacc8570a2643ca7f74ee80da5666856febb70ee01b6635ff0877807ce56d1f78e9b7f23ecea6ce583786622480ea10a16f3834f97160c50457e4b565882d2746b115b867d22dd2a359364f1ca3fbba5e91cec91ee5f021d4269cae712f7e7e059627317ca850ede7d92acdeaae502965ae442b3df169beab8d35f21585097080f497fcb37a7c9e61dcee5db65c2db6718fa5ef49b2c93dfa2907e630357192e860559", 0xef}, {&(0x7f00000017c0)="b76cbcb62d7950d00d8d199672e19907753d682e816925290419cff0acb722f382b1e42e3771f1c775e0a41532116fcf06bdc3e30c7882e7a4f97fcbb4ef856d44d41c265c062de73a7476bb33aa88", 0x4f}, {&(0x7f00000014c0)="9b98475adc82895e27b0cb205474f04ce4d3e099dd4b189c49930f8237158f2d96e61d91e0ab0d48be13e9ead75405daf64d5fb194496fbf34f1570a53b9d114bee2416dc9259f7e9d06ca08663aea594de735eaf7784b5f46153e0234dc0055ce7e6fc8ec547ac82b37722bec496b95ef1c3a8d1a14be7d0c41dc7bd0d692be9c47d60d0b684eb9632ba95981b154cf6d70479298ba55a23b5506781f7757e9e6c618cf83ee9572f9523b7f20eab4174f5b425817c20ee45a7a84afc1b61a8ac9ae3022c733136893", 0xc9}], 0x6, 0x1, 0x7, 0x12) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000001640)={0xff52, {{0x2, 0x4e23, @local}}}, 0x88) request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='::[))$\x00', r1) keyctl$chown(0x4, r1, 0x0, 0x0) 04:08:15 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="aa1faea906a7664d2950a0258c60b968fac5495f7bc9512d5e7cb63a0c8d7f2294e7b1c0577854197c462a2a0c1ba50ab8ff68aefc857bc724a7f901682a78d11c3f0ee2adca1c483c68b026e70a7c6042cb568f991f6d3fe67acb9d62ec629783fd94a762517a1835d57331f1affecd82b638d63c23158d62329fbdd86164554cb938e1cdf51e1eab2e1c97a91b7592f602c344116caa8701856ddec29d73c2539a2f0464", 0xa5}, {&(0x7f0000000200)="086b6ab53c27c16050d34d899dbf8d352b704d6076d4166984433b021d2f1c687d61ad7a0a373175fb96ef06b589681d769802cba16f1bc1ed534320c088f5e14f2d2f8ca39587a0aec1697f0bf83364e9a651b3aea7197eb75e5ee4f6cfc5c1767cb3961f17ed577aca876066af0820e8fb4bdf718a413adbf07ba899ff192cdf33aafabfc1faaecca359b2dffd82e1c2b8360d6733ef5c2f76094ad4b8fb01fe7f067cf323c6008637a8c0a48c963fc658ef290ddd17c6f6d8a54ee489d58fa64ee25c", 0xc4}, {&(0x7f00000003c0)="5b7bac985a359ea34e406016cb4d2253a2d6bdcf3d463de79227186b45686839f6165525644a8edd3904a15eb2658c48a7058ca2badc30f4c6bd8cd9c253bc7f0a8b3b83556161fe555e943a6e04b27c0f44f12ab1b96a5600ab52abc34de4ac0012aff7b2488c3808e0e6d043c128e8fcc8baadc8b0885ef69abe7ddfab2068a49c16d269dd9e79cb61a8e85d", 0x8d}, {&(0x7f0000000480)="29434ee93382a19b3bf63f3063af6be5af2661d5d79856e9b7141e129b1510c3caffb463799fe827edee3b692b0c4b6379ac8482810327958c3a3a2c8ad4f830cec6e39c4fbe6d7f5b8edd942727de8b25e8aa8e2bf08045f439b7fd22378ac9701f34e0ae670ad9c090667d7b8ac645118b4038201735b7340b5d88efe9fb4c21422d6cefd28ab71f946a8b22e6f32c0ba13f6ccbc2c1040c3a2019d46fe13955352438d32f67d61aa1b4c845bce1ed8a725c1b3cd94970db41892a3baf", 0xbe}], 0x4}, 0x1) r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x4, 0x80, 0x8, 0x5b, 0x5, 0x7, 0x0, 0xd38, 0x16b8, 0x933dbbfbf1d0951f, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000540), 0xb}, 0x1, 0xb648, 0x60000, 0xb, 0x2, 0x3f, 0x7f, 0x0, 0x9, 0x0, 0x5}, 0x0, 0x9, r0, 0xa) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r2, 0x0) getgroups(0x6, &(0x7f0000000600)=[0xee01, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) keyctl$chown(0x4, r1, r2, r3) 04:08:15 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) 04:08:15 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000003c0)='/pro\x8f\x13c/thread-self/at\x06r/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb@\x00\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\xcbK\x81c\xc8E\xcc\x017P[*\x1e@\xda\t\xb8,7\xdau\xeb\x02\xc6\x00\xe9\xc4\xbf\x0f&\x1e\x95Ra\xdef\x7f6.\xb6]\x0f_\xd6UXv.5fk\x8d;[\x1b\xbd<\x1fmV\xa6!\x8f\xed\xa6?\xbf\xd6_\x8e\x16\xc3O\x81T|Ep\xf8j?#x\x0e\xa1z\xfa5\xd0\x06h\x12\xe8\xe2\x98,\xe0\xdd.\x98\x0e\xda\xff\x0098\x02g\xfc\xa2`\x18\x98%\x89\xb7D#)\x8e\x7f\x10\xae9\xae\xac\x1b\x19\x98U\xf1\xc5lm\x9e;-\xca\xdeE!\xd2g\xdf\xc6o\xfa\x84\x01\b\x153\'J\rv\x0f\xd1\x10!E\x87O\xa7&\xe3\"u\x94;\x84\x06\x1cv\xff\'\xa8^\x0fL\xc2\xd0\xde\x96\xab\xa2\x00'/538, 0x2) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x7, 0x9, 0x80, 0x0, 0xfff, 0x28800, 0xe, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x983c, 0x0, @perf_config_ext={0x8, 0x6}, 0x1004, 0xfffffffffffffffd, 0x7, 0x1, 0x1, 0x7, 0x41, 0x0, 0x9, 0x0, 0x5}, r2, 0x4, r0, 0x22b9575ade738385) r3 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0xc020662a, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/480]) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x0) 04:08:15 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) 04:08:15 executing program 3: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:15 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) [ 943.609162] FAULT_INJECTION: forcing a failure. [ 943.609162] name failslab, interval 1, probability 0, space 0, times 0 [ 943.610927] CPU: 0 UID: 0 PID: 8166 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 943.610965] Tainted: [W]=WARN [ 943.610972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 943.610985] Call Trace: [ 943.610992] [ 943.611001] dump_stack_lvl+0xfa/0x120 [ 943.611033] should_fail_ex+0x4d7/0x5e0 [ 943.611068] ? __kernfs_new_node+0xd3/0x930 [ 943.611094] should_failslab+0xc2/0x120 [ 943.611116] kmem_cache_alloc_noprof+0x80/0x760 [ 943.611156] ? __kernfs_new_node+0xd3/0x930 [ 943.611181] __kernfs_new_node+0xd3/0x930 [ 943.611205] ? __lock_acquire+0x451/0x2250 [ 943.611235] ? __pfx___kernfs_new_node+0x10/0x10 [ 943.611267] ? lock_acquire+0x15e/0x2d0 [ 943.611289] ? kernfs_root+0x23/0x2a0 [ 943.611315] ? find_held_lock+0x2b/0x80 [ 943.611345] ? kernfs_root+0xee/0x2a0 [ 943.611371] ? lock_release+0xc8/0x270 [ 943.611392] ? lock_is_held_type+0x9e/0x120 [ 943.611423] kernfs_new_node+0x13c/0x1e0 [ 943.611459] __kernfs_create_file+0x55/0x360 [ 943.611485] sysfs_add_file_mode_ns+0x21c/0x430 [ 943.611514] ? __pfx_dev_attr_store+0x10/0x10 [ 943.611545] internal_create_group+0x662/0xeb0 [ 943.611584] ? __pfx_internal_create_group+0x10/0x10 [ 943.611611] ? blk_validate_limits+0xc27/0x15c0 [ 943.611639] ? lock_is_held_type+0x9e/0x120 [ 943.611666] loop_configure+0xc46/0x15a0 [ 943.611727] ? __pfx_loop_configure+0x10/0x10 [ 943.611772] ? avc_has_extended_perms+0x107/0xf20 [ 943.611795] ? find_held_lock+0x2b/0x80 [ 943.611825] ? avc_has_extended_perms+0x23b/0xf20 [ 943.611846] ? lock_release+0xc8/0x270 [ 943.611874] lo_ioctl+0x66d/0x1ca0 [ 943.611905] ? __pfx_lo_ioctl+0x10/0x10 [ 943.611929] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 943.611959] ? lock_acquire+0x15e/0x2d0 [ 943.611993] ? __virt_addr_valid+0x1c6/0x5d0 [ 943.612018] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 943.612046] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 943.612071] ? lock_release+0xc8/0x270 [ 943.612096] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 943.612128] ? blkdev_common_ioctl+0x1c3/0x2830 [ 943.612187] ? check_path.constprop.0+0x50/0x50 [ 943.612220] ? __fget_files+0x34/0x3b0 [ 943.612253] ? find_held_lock+0x2b/0x80 [ 943.612283] ? __fget_files+0x203/0x3b0 [ 943.612317] ? __pfx_lo_ioctl+0x10/0x10 [ 943.612342] blkdev_ioctl+0x365/0x6d0 [ 943.612365] ? __pfx_blkdev_ioctl+0x10/0x10 [ 943.612388] ? selinux_file_ioctl+0xb9/0x280 [ 943.612420] ? __pfx_blkdev_ioctl+0x10/0x10 [ 943.612445] __x64_sys_ioctl+0x18f/0x210 [ 943.612477] do_syscall_64+0xbf/0x420 [ 943.612506] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 943.612528] RIP: 0033:0x7f0eb800f8d7 [ 943.612544] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 943.612565] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 943.612586] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb800f8d7 [ 943.612600] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 943.612613] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 943.612626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 943.612638] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 943.612671] [ 943.680310] Invalid ELF header len 9 04:08:15 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_PMKSA(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, r0, 0x8, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xffff, 0xd}}}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0xffff785d}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000240)=[{0x7, 0x0, 0x7, 0x7}, {0x0, 0x1, 0x1, 0x52}, {0x80, 0x1, 0x8, 0x6ca}]}) syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_AP(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x1c, r5, 0x5, 0x0, 0x0, {{0x5}, {@val={0x8, 0x3, r6}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x174, r0, 0x300, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x800, 0x4c}}}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x10}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x8001}, @NL80211_ATTR_FRAME_MATCH={0x6b, 0x5b, "7781f37dedc04e6d02d5da9a62313179bf6cc29c14756e409c7267b885c4749856b5e4cddb1992c12e9aa3c419c6826e40815e9f7afb302831ca0812fb6ede6c539748e15f74ccd373724fa649bc9577105f48143beb2de97f32b5d5d2ddbd0ad2f906d16e9951"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x80}, @NL80211_ATTR_FRAME_MATCH={0xbf, 0x5b, "05603ec458a145c9ec83f996eb0fb506c1dcc1638a259ca162a870a18948b3fe115b208dc664cce06fc20bce5a03f562c21f752a1efeb44a219c904ff4154a50d015c9a81307505a2f73df3ecd0ad9288afe5bd8cd6e873354327c4b407d89a2b03a00b5119c68cf1a4d379826eb97628f8b8ea5bb9e086b3f2b9cf76b092aeab64e290ebf2c26f3f8b02599cea6565a892ffc5ca32d0a284b9a94216bb719abaed74360a8c701d3d3ae79bc5b278bff653c53ef2d324e242d9d98"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x7}]}, 0x174}, 0x1, 0x0, 0x0, 0x80}, 0x40) rmdir(&(0x7f0000000180)='./file0\x00') r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x6d01, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, r7}, './file1\x00'}) 04:08:15 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) 04:08:15 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) 04:08:15 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="b2d29d829fb5ea5a5419af536d3e95ac75d7e8", 0x13, 0xffffffffffffffff) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r1, 0x0, r2) add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:15 executing program 4: ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) [ 943.739093] loop0: detected capacity change from 0 to 32792 04:08:15 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) [ 943.805822] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated 04:08:15 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r2 = getpid() setpriority(0x0, r2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x8, 0x40, 0x84, 0x0, 0x5, 0x810, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_config_ext={0x6, 0xeaf}, 0x8, 0x40, 0xed3, 0x2, 0x5, 0x8, 0x0, 0x0, 0xb56, 0x0, 0x80}, r2, 0x7, r0, 0x8) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x0) [ 943.815009] EXT4-fs (loop0): get root inode failed [ 943.815766] EXT4-fs (loop0): mount failed 04:08:15 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) [ 943.916066] Invalid ELF header len 9 04:08:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 35) [ 943.931432] Invalid ELF header len 9 [ 944.072670] loop0: detected capacity change from 0 to 32792 [ 944.098167] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 944.101256] EXT4-fs (loop0): get root inode failed [ 944.102412] EXT4-fs (loop0): mount failed 04:08:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:08:28 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfbce}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x80000000000000, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) keyctl$chown(0x4, r2, 0x0, 0x0) add_key(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000200)="e0c56575434f61bb61313ce7844010f6b008432b727a9a2e5d8f84545788e8c96c4f99abea431f32a8b766fa731ff46d1b58bdeedfc033c7ce0cebc243c9d61967148d5afb75d92aa2c80e34af00a3f754420ab784b07731547359770c3ce83f475b201d8d7b677c068cff98b613457e55031ae0106d5862f51ce1c75d9716d4fd4d44652fbedde749327d27da6fa28c3f38b48de5b88a2f6966e94d8004e4299742ce0ffb41927671205b15e71d24ade32ce8a2fbb7aa47400b8f347670c8d8abf2f63af3f98d5da7167fcce834046b71777260ace007febe61547181f1", 0xde, r2) keyctl$chown(0x4, r1, 0xee00, 0xee00) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) finit_module(r3, &(0x7f0000000100)='&\x89+@{}](\x00', 0x3) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000013c0)="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", 0x1000, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0x0, 0x0) 04:08:28 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="5550ffa36747cd914f35d095981c768cdb08c9c96d4dd69292b456982cb1a9bd8423ed675e5922af417e16d8ce5ec16773a50b9a7b10ca121f2e475d56af66544a9af4", 0x43, r0) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 36) 04:08:28 executing program 7: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r4, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r2, r3, r4}}, 0x71) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r5, 0x0) keyctl$chown(0x4, r1, r5, r3) r6 = gettid() r7 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r7, 0xee00, 0xee00) keyctl$chown(0x4, r7, 0x0, 0x0) r8 = add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="ed0740b4a70a9b1f08ec03ba74793be8d98b7202b5438ef936995325af4cb8f426420347d41d6267bb219b7efa8b9416618ac6270fead14c79ff753d93b3478b93acf59304139c3cd698e5e35028222a67d9629c0c7c59c258edf6d2cdee335467d6e34fd4151568180f1d7fc0d60d", 0x6f, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r7, r8, 0x1) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x8, 0x0, 0x1, 0x40, 0x0, 0x2, 0xa00d0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x20, 0x2, @perf_config_ext={0xe1cf, 0x6}, 0x2008, 0x6, 0x1, 0x5, 0x400, 0x9, 0x40, 0x0, 0x10001, 0x0, 0x1}, r6, 0x3, r0, 0xa) keyctl$chown(0x4, r1, 0x0, 0x0) 04:08:28 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) fcntl$addseals(r1, 0x409, 0x4) ftruncate(r0, 0x9) ftruncate(r1, 0x3) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x9ec40, 0x0) finit_module(r2, 0x0, 0x3) 04:08:28 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x0) finit_module(r2, &(0x7f00000002c0)='-\x00', 0x3) finit_module(r1, 0x0, 0x6) fstat(r1, &(0x7f0000000080)) io_setup(0xfff, &(0x7f0000000040)=0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x140241, 0x0) io_submit(r3, 0xa, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000)='\n', 0x1}]) [ 956.090945] FAULT_INJECTION: forcing a failure. [ 956.090945] name failslab, interval 1, probability 0, space 0, times 0 [ 956.092094] CPU: 1 UID: 0 PID: 8221 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 956.092127] Tainted: [W]=WARN [ 956.092132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 956.092140] Call Trace: [ 956.092144] [ 956.092150] dump_stack_lvl+0xfa/0x120 [ 956.092175] should_fail_ex+0x4d7/0x5e0 [ 956.092203] ? __kernfs_new_node+0xd3/0x930 [ 956.092223] should_failslab+0xc2/0x120 [ 956.092241] kmem_cache_alloc_noprof+0x80/0x760 [ 956.092266] ? perf_trace_lock_acquire+0xc9/0x700 [ 956.092301] ? __kernfs_new_node+0xd3/0x930 [ 956.092324] __kernfs_new_node+0xd3/0x930 [ 956.092347] ? __lock_acquire+0x451/0x2250 [ 956.092373] ? __pfx___kernfs_new_node+0x10/0x10 [ 956.092403] ? lock_acquire+0x15e/0x2d0 [ 956.092423] ? kernfs_root+0x23/0x2a0 [ 956.092450] ? find_held_lock+0x2b/0x80 [ 956.092471] ? kernfs_root+0xee/0x2a0 [ 956.092485] ? lock_release+0xc8/0x270 [ 956.092497] ? lock_is_held_type+0x9e/0x120 [ 956.092515] kernfs_new_node+0x13c/0x1e0 [ 956.092536] __kernfs_create_file+0x55/0x360 [ 956.092552] sysfs_add_file_mode_ns+0x21c/0x430 [ 956.092569] ? __pfx_dev_attr_store+0x10/0x10 [ 956.092588] internal_create_group+0x662/0xeb0 [ 956.092610] ? __pfx_internal_create_group+0x10/0x10 [ 956.092625] ? blk_validate_limits+0xc27/0x15c0 [ 956.092642] ? lock_is_held_type+0x9e/0x120 [ 956.092657] loop_configure+0xc46/0x15a0 [ 956.092690] ? __pfx_loop_configure+0x10/0x10 [ 956.092722] ? avc_has_extended_perms+0x107/0xf20 [ 956.092737] ? find_held_lock+0x2b/0x80 [ 956.092760] ? avc_has_extended_perms+0x23b/0xf20 [ 956.092776] ? lock_release+0xc8/0x270 [ 956.092796] lo_ioctl+0x66d/0x1ca0 [ 956.092822] ? __pfx_lo_ioctl+0x10/0x10 [ 956.092839] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 956.092863] ? lock_acquire+0x15e/0x2d0 [ 956.092880] ? __virt_addr_valid+0x1c6/0x5d0 [ 956.092900] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 956.092923] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 956.092941] ? lock_release+0xc8/0x270 [ 956.092960] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 956.092987] ? blkdev_common_ioctl+0x1c3/0x2830 [ 956.093036] ? check_path.constprop.0+0x50/0x50 [ 956.093062] ? __fget_files+0x34/0x3b0 [ 956.093088] ? find_held_lock+0x2b/0x80 [ 956.093112] ? __fget_files+0x203/0x3b0 [ 956.093138] ? __pfx_lo_ioctl+0x10/0x10 [ 956.093157] blkdev_ioctl+0x365/0x6d0 [ 956.093176] ? __pfx_blkdev_ioctl+0x10/0x10 [ 956.093198] ? selinux_file_ioctl+0xb9/0x280 [ 956.093223] ? __pfx_blkdev_ioctl+0x10/0x10 [ 956.093243] __x64_sys_ioctl+0x18f/0x210 [ 956.093268] do_syscall_64+0xbf/0x420 [ 956.093290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 956.093306] RIP: 0033:0x7f0eb800f8d7 [ 956.093319] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 956.093335] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 956.093350] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb800f8d7 [ 956.093361] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 956.093371] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 956.093380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 956.093390] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 956.093416] 04:08:28 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000280)=@chain={'key_or_keyring:', r2}) keyctl$chown(0x4, r0, 0xee00, 0xee00) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="5f3103d40ed2b6923edce3ee11dce9c1fb0bfee0d30e09ae271cc6525da216f0185793eaece2956cd9a21c2d126e2c4eada654ff57643617621f76a7cb83d0efd49d3a4de4753e8c64cb57e1771ef2e635", 0x51, r3) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:28 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x1f, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4520, 0xb, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x7ff}, 0x13683, 0x101, 0x800, 0x6, 0x3, 0x0, 0x3, 0x0, 0x7, 0x0, 0x3}, 0xffffffffffffffff, 0xe, r1, 0x8) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) keyctl$chown(0x4, r2, 0x0, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x210040, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000240)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r3, 0x5000943a, &(0x7f00000003c0)={{r1}, r4, 0x4, @unused=[0x6, 0x6, 0x0, 0x2], @subvolid=0x2}) r5 = open(&(0x7f0000000140)='./file0\x00', 0x100, 0x10b) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0x8, 0x32, 0x7, 0x0, 0x1, 0x800, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x3, 0x8}, 0x1008, 0x4c6, 0x5, 0x6, 0x4, 0x1, 0x8, 0x0, 0x4, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r5, 0xf) 04:08:28 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:28 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r1, 0x0) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) keyctl$chown(0x4, r0, r1, r2) [ 956.236172] loop0: detected capacity change from 0 to 32792 04:08:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:08:28 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) lseek(r0, 0x1, 0x2) finit_module(r1, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sctp\x00') copy_file_range(r1, &(0x7f0000000000)=0x44, r2, 0x0, 0x800, 0x0) [ 956.288689] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 956.295187] EXT4-fs (loop0): get root inode failed [ 956.296015] EXT4-fs (loop0): mount failed 04:08:28 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:28 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) keyctl$chown(0x4, r0, 0xee01, 0xee01) 04:08:28 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='.}\\%\t[}%#:\x00', r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) [ 956.362639] Invalid ELF header len 9 04:08:28 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) [ 956.387497] Invalid ELF header len 9 04:08:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 37) [ 956.482944] loop0: detected capacity change from 0 to 32792 [ 956.500225] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 956.502025] EXT4-fs (loop0): get root inode failed [ 956.502441] EXT4-fs (loop0): mount failed 04:08:37 executing program 2: preadv2(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/149, 0x95}, {&(0x7f0000000140)=""/114, 0x72}, {&(0x7f00000001c0)=""/53, 0x35}, {&(0x7f0000000200)=""/163, 0xa3}], 0x4, 0x2, 0xb32b, 0x18) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x5, 0x22445, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x7, 0x6}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0xffffffffffff3f00, &(0x7f0000000200), 0x0, 0x0) 04:08:37 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r1) add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000200)="fa6c", 0x2, r2) keyctl$chown(0x4, r1, 0xee00, 0xee00) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r3, 0x0) fstat(r0, &(0x7f0000000000)) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r4, 0x0) keyctl$chown(0x4, r1, r3, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}]}) 04:08:37 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x100, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, 0x0) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:08:37 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "80eade33a2bb78d2549fcb4ebc51f24bc52a52064faf67da2e10bc39de7a2d18350046ad595ff5d523f7281ba7c08ee76db0a74b4695f7217b7552973a417d47", 0x36}, 0x48, r0) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000140), &(0x7f0000000200)) keyctl$chown(0x4, r1, 0x0, r2) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:37 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x6, 0x80000) gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x1, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) ioctl$BTRFS_IOC_SNAP_CREATE(r3, 0x50009401, &(0x7f00000003c0)={{r4}, "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"}) 04:08:37 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 38) [ 965.182118] loop0: detected capacity change from 0 to 32792 [ 965.204700] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 965.208343] Invalid ELF header len 9 [ 965.212056] EXT4-fs (loop0): get root inode failed [ 965.212571] EXT4-fs (loop0): mount failed [ 965.252007] Invalid ELF header len 9 04:08:47 executing program 5: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 04:08:47 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) dup3(r0, r1, 0x0) readv(r0, &(0x7f0000001500)=[{&(0x7f0000000140)=""/143, 0x8f}, {&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/80, 0x50}, {&(0x7f0000000000)=""/14, 0xe}, {&(0x7f0000001340)=""/131, 0x83}, {&(0x7f0000001400)=""/201, 0xc9}], 0x7) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x0, 0x13, r1, 0x0) 04:08:47 executing program 3: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:47 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) pread64(r0, &(0x7f0000000000)=""/78, 0x4e, 0x3) ftruncate(r1, 0x9) r2 = signalfd4(r0, &(0x7f0000000200)={[0x1000]}, 0x8, 0x800) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000240)) finit_module(r1, 0x0, 0x0) 04:08:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 39) 04:08:47 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:47 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:47 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) [ 975.850658] loop0: detected capacity change from 0 to 32792 04:08:48 executing program 5: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) [ 975.857594] Invalid ELF header len 9 04:08:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:48 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7, 0x3, 0x8c, 0x5, 0x0, 0x0, 0x60002, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x9}, 0x14500, 0xffff, 0x7, 0x9, 0x5, 0x7, 0x6, 0x0, 0xffff, 0x0, 0x3}, r2, 0xd, r0, 0xa) keyctl$chown(0x4, r1, 0x0, 0x0) [ 975.890151] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 975.892047] Invalid ELF header len 9 [ 975.901042] EXT4-fs (loop0): get root inode failed [ 975.902056] EXT4-fs (loop0): mount failed 04:08:48 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) r1 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r3, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000340)={0x71, 0x7d, 0x2, {{0x0, 0x5a, 0x4dc, 0x4, {0xe5be30dbb6acd81a, 0x0, 0x2}, 0x18000000, 0x70, 0xff, 0x41, 0x12, '/dev/loop-control\x00', 0x2, '-/', 0x12, '/dev/loop-control\x00', 0x1, '\x00'}, 0x2, '(#', r1, r2, r3}}, 0x71) r4 = getuid() keyctl$chown(0x4, r0, r4, r2) 04:08:48 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="ed7e8c814375fe6a95c9fc8c0685c33e460c392087439a357cb0aa6a23475177e1b0249675c88060bb55fa40c4917f389c5bd0b2009962de4bd0114c00a3e01285043f8dfe63be092d9a08d27faf615bcf5b344a9ceda6e957c193c611c39df912b49481bdfcd4fd0165606cdc482ffcbdf75d71970bf17d04883f3c2f8f5b6a2156d19f1ba058418a", 0x89, r0) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:48 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '\'@'}], 0xa, "b571ea54e8bcdefd6171bb0a1626ab13d6e583f877ff20a74046e349d7ca483e588d65c85258f6eaab5b4511c31b5c68d127df41053c88cfcf068a6a5840595c2878bf4b8adaaa27c6b9ded8b5abdb20b6422e3c4013bffb1b691a8e1804855a882104e8d46d5aa03a821712c9c6832cd0f2f0157f410b1598874f23e5d1bf8bf74cddd2cd7473959008250530a523cf20549b3dbe23394c2e9748b38907c335bc8be1ba30f84fbc62649f1f7fbb57189aff47431a9f442b58a182515aa46881fa863be16b991a5fe35a9967af47d81f3be8f94675e49b029f"}, 0xe7) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) 04:08:48 executing program 5: add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:48 executing program 1: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x6d, 0x9, 0x81, 0x20, 0x0, 0x45000, 0x40000, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x10100, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x200, 0x9, 0x6, 0x8, 0x0, 0xc718, 0xfd, 0x0, 0x7fff, 0x0, 0x2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x80008) finit_module(r0, 0x0, 0x0) 04:08:48 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x7, 0x3, 0x8c, 0x5, 0x0, 0x0, 0x60002, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x9}, 0x14500, 0xffff, 0x7, 0x9, 0x5, 0x7, 0x6, 0x0, 0xffff, 0x0, 0x3}, r2, 0xd, r0, 0xa) keyctl$chown(0x4, r1, 0x0, 0x0) 04:08:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 40) 04:08:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:48 executing program 7: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x80) [ 976.153025] Invalid ELF header magic: != ELF [ 976.161072] Invalid ELF header magic: != ELF [ 976.161579] FAULT_INJECTION: forcing a failure. [ 976.161579] name failslab, interval 1, probability 0, space 0, times 0 [ 976.162640] CPU: 1 UID: 0 PID: 8359 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 976.162659] Tainted: [W]=WARN [ 976.162663] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 976.162670] Call Trace: [ 976.162674] [ 976.162679] dump_stack_lvl+0xfa/0x120 [ 976.162701] should_fail_ex+0x4d7/0x5e0 [ 976.162724] ? __kernfs_new_node+0xd3/0x930 [ 976.162739] should_failslab+0xc2/0x120 [ 976.162752] kmem_cache_alloc_noprof+0x80/0x760 [ 976.162774] ? __kernfs_new_node+0xd3/0x930 [ 976.162787] __kernfs_new_node+0xd3/0x930 [ 976.162800] ? __lock_acquire+0x451/0x2250 [ 976.162818] ? __pfx___kernfs_new_node+0x10/0x10 [ 976.162835] ? lock_acquire+0x15e/0x2d0 [ 976.162847] ? kernfs_root+0x23/0x2a0 [ 976.162861] ? find_held_lock+0x2b/0x80 [ 976.162878] ? kernfs_root+0xee/0x2a0 [ 976.162892] ? lock_release+0xc8/0x270 [ 976.162903] ? lock_is_held_type+0x9e/0x120 [ 976.162920] kernfs_new_node+0x13c/0x1e0 [ 976.162940] __kernfs_create_file+0x55/0x360 [ 976.162954] sysfs_add_file_mode_ns+0x21c/0x430 [ 976.162970] ? __pfx_dev_attr_store+0x10/0x10 [ 976.162989] internal_create_group+0x662/0xeb0 [ 976.163012] ? __pfx_internal_create_group+0x10/0x10 [ 976.163029] ? blk_validate_limits+0xc27/0x15c0 [ 976.163045] ? lock_is_held_type+0x9e/0x120 [ 976.163060] loop_configure+0xc46/0x15a0 [ 976.163090] ? __pfx_loop_configure+0x10/0x10 [ 976.163114] ? avc_has_extended_perms+0x107/0xf20 [ 976.163127] ? find_held_lock+0x2b/0x80 [ 976.163144] ? avc_has_extended_perms+0x23b/0xf20 [ 976.163155] ? lock_release+0xc8/0x270 [ 976.163170] lo_ioctl+0x66d/0x1ca0 [ 976.163187] ? __pfx_lo_ioctl+0x10/0x10 [ 976.163200] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 976.163216] ? lock_acquire+0x15e/0x2d0 [ 976.163229] ? __virt_addr_valid+0x1c6/0x5d0 [ 976.163243] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 976.163259] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 976.163273] ? lock_release+0xc8/0x270 [ 976.163286] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 976.163305] ? blkdev_common_ioctl+0x1c3/0x2830 [ 976.163338] ? check_path.constprop.0+0x50/0x50 [ 976.163356] ? __fget_files+0x34/0x3b0 [ 976.163374] ? find_held_lock+0x2b/0x80 [ 976.163390] ? __fget_files+0x203/0x3b0 [ 976.163409] ? __pfx_lo_ioctl+0x10/0x10 [ 976.163422] blkdev_ioctl+0x365/0x6d0 [ 976.163435] ? __pfx_blkdev_ioctl+0x10/0x10 [ 976.163448] ? selinux_file_ioctl+0xb9/0x280 [ 976.163465] ? __pfx_blkdev_ioctl+0x10/0x10 [ 976.163478] __x64_sys_ioctl+0x18f/0x210 [ 976.163496] do_syscall_64+0xbf/0x420 [ 976.163512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 976.163525] RIP: 0033:0x7f0eb800f8d7 [ 976.163534] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 976.163545] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 976.163557] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb800f8d7 [ 976.163565] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 976.163572] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 976.163579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 976.163586] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 976.163603] 04:08:48 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) 04:08:48 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) [ 976.263350] Invalid ELF header len 9 [ 976.276217] loop0: detected capacity change from 0 to 32792 [ 976.306633] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 976.313022] EXT4-fs (loop0): get root inode failed [ 976.313449] EXT4-fs (loop0): mount failed 04:08:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 41) 04:08:56 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:56 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:08:56 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x3, 0x7f}) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r2 = eventfd2(0x0, 0x0) fcntl$addseals(r2, 0x409, 0x1) ftruncate(r1, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000200)=0xc) syz_open_procfs(r3, &(0x7f0000000240)='attr/exec\x00') finit_module(r1, 0x0, 0x0) 04:08:56 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) sendmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x20000000}, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001780)={0x0, 0x0, 0x0}, &(0x7f00000017c0)=0xc) r7 = dup3(r2, r3, 0x0) pipe2(&(0x7f0000001f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000002180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r8, @ANYBLOB="06000000000000002e2f66696c653000290401d8f935406dbdb784d611e1a818c8bc40ff1e2bfc4d0ec65aecc2f1e15d42eec6ac005d22877ae3555b4eb5"]) getsockopt$packet_buf(r7, 0x107, 0x6, 0x0, &(0x7f0000000440)) r10 = socket$packet(0x11, 0x2, 0x300) bind$bt_sco(r1, &(0x7f0000001800), 0x8) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000200)={'netpci0\x00', 0x0}) bind$packet(r10, &(0x7f0000000080)={0x11, 0x15, r12, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000023c0)={'ip6gre0\x00', &(0x7f0000002340)={'syztnl0\x00', r12, 0x2f, 0x13, 0x6, 0xf4, 0x0, @dev={0xfe, 0x80, '\x00', 0x3b}, @remote, 0x20, 0x20, 0x3ff, 0x6}}) mount$9p_fd(0x0, &(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0), 0x1, &(0x7f0000002040)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@uname={'uname', 0x3d, '\x00'}}, {@dfltgid={'dfltgid', 0x3d, r6}}, {@cache_loose}, {@noextend}, {@msize={'msize', 0x3d, 0xa42}}, {@access_user}, {@version_9p2000}, {@cache_fscache}, {@version_u}, {@version_L}], [{@appraise_type}, {@uid_gt}, {@permit_directio}, {@euid_lt={'euid<', r5}}]}}) sendmmsg$inet6(r7, &(0x7f0000003740)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x20, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="9301100bca9e6e47c0bb0a88c3e691336630185077cfd4f93f9314c5a489fddb7a026f3fb175b4d67a23b8a7374fa4d0ec0ea23b75ece606edcf2d4e4e664d0eeafc1f8719b6f3d5c4c650916dd8d73fef4596bc58953dfdf3a9702fe9d7f6a79498d56fb15179c4bae3cbdddc", 0x6d}], 0x1}}, {{&(0x7f0000000140)={0xa, 0x4e24, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}, 0x1c, &(0x7f0000001500)=[{&(0x7f0000000180)="16bf0e64988a09fe429d932cb8140fe16d4b1b2cff300dfcad5c11e47056d84fe7d560dc3f21cc39d1822710d280a11e7ac9", 0x32}, {&(0x7f00000001c0)="d7c16fea39351fa3ee1443bd05d5b6d9d71fdf00dd25392fcd713a259ce56358975bf38e011d9df82f3300573717403ffb4f27414813a48e4a7faeac4882015935003612759228f93ca758439504291b7e69655755a5a1ba1efd865a4a08f1438427b5cb0998693e2a00a80fb0af7a49f3c74c5d1cd61ec55a8ae342a38e686872c4c7ff090ecbfe0e2f6e1e6d", 0x8d}, {&(0x7f0000000280)="de0a4e9f013772db2fc47d51179f51df0c2d358bb6321e3a85843929b7311f8a4b101409e0b308c2c582bd1168aff3fc06b9bf5c6e36c3dc125722f2e9a26f78f78b3831910c83b33b9ed62b5425802d2ce0bc86091858eda55dab1123290975562b1f49fee6a1782ad4060e190c83b97df5e27c9c5addeae43e1949a1512809292233fe921937bf3633200d4be770e649827e11a091d709792e970039ba994a3257a9253b342a18dd1f625352d89a56fb8c32f63e39ff5fa78af69e9e401942f05967126986ebd8d24159df1f998788", 0xd0}, {&(0x7f0000000380)="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", 0xfa}, {&(0x7f0000000500)="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", 0x1000}], 0x5, &(0x7f0000001580)=[@pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', r13}}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x29, 0xe, 0x6788680480869133, 0x1, 0x0, [@empty, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}], 0xb0}}, {{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000480)="fc9858072f8afd6e688209", 0xb}, {&(0x7f0000001640)="2fdc938421b7c4588ec3a5dfdfa91f7cb26de82c90d499958829b3dc4fa7f228d5ca8456ea6acf89118f8b1260dc69c33750afd634382dbe", 0x38}, {&(0x7f0000001680)="80118b0da65eca5720ffb8625b5612d2939efc9f222f7e5c2508ba44613292a03e5ce8039679f9c5acff7a594872e69373e7d1c1f69570db9ff57fcadd7be0488255cda715a731cb817fd184110af9b9936404644527edc271d598b783ccc7bf4c5a907513532e1287518919d1b73ac19f7b1c5feb3e5ccf0e", 0x79}, {&(0x7f0000001700)="51b5c19cf151094f7a5a018a6a2c51157b09ed21633f838b05828236e21a474041bddcb9599e49b5d50cbf79c7e37c46d6007b99e70612ac62ab", 0x3a}, {&(0x7f0000001740)="f8e88fb2f3", 0x5}, {&(0x7f0000001e00)="aea2beadc1540496b9e560b659252b0077c22c3c469d4ee9227fce6840eebc415ba7733cf5d14386c19bf259bf6f6020fe762f6ccd98671500de6afff8dc769f80efc37d50d5b8a37ad6ab5541d7a38a797db0d3335fc66b78b51f218b29e84d188871c1746aa6d2059d732300b12b438e883ba0bc4183efee164fd8d46e46abd744726489d7b7ca6f7b3f42af14f56865f95a4f06e169efb7577a1cbcc55ad3531f9cd35876e8dc5e0b456823d731b50793eeb8be69dfa8", 0xb8}, {&(0x7f0000001840)="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", 0xfe}, {&(0x7f0000001940)="fac3168e9d0b2968b28416de23a944700e8b4bd10d3f175f21ab749844b0c42be51eeee434919b9c73bc0a3234279512132b7924e6d1dd27dd1086cb807332d2d90c8cf464ad97cc8fc917460b16929024f0ace2150382db2b9c9bb666b975956fc83d7a7c0bfab00950e8f1c4f3bcc0aaeec009012af1", 0x77}, {&(0x7f00000019c0)="59f185854e87f4ff5a91a55b55830df8448093e6acd639241db94f06532bb1ee03efd33c08a914b839a0cc2d6f38968de226f60b61bbceefaad16f57b3fc7dfeb00767f0a54e9ba071646f6974faf573e358d299f8", 0x55}, {&(0x7f0000001a40)="d48cf11bec7ea9d256984cc4bd983dde0001964bbd587e6ddb28c3aef37a3f1bb30e84a447d219e0c9791fc73c3ef917dc718241b4b636f887a18e09c66d292607a417d9ace5a9357404f5738219df553622157fa3a036d976e31384f27340da8654dd8ee0a27ddcacc289af4451d86efecc4482a4369ec5ece5d7c5db55aa0ac29487526656356e7267420a3d89680e2c2a03e0b452b0ce61819d16be4a01fe2e28ff714deb39bcb38b74cc0c", 0xad}], 0xa, &(0x7f0000001bc0)=ANY=[@ANYBLOB="300000000000000029000000040000005e0300000000000007100000000302023f000700000000000000c204002000012400000013000000001e000000000000000000000100"/80, @ANYRES16=r4, @ANYBLOB="00000000140000000000000029000000340000001e29000000000000"], 0x70}}, {{&(0x7f0000001c40)={0xa, 0x4e21, 0x699d, @private0, 0x5102205e}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f0000001c80)="769289832ea95783291eeb2e7e7197c87ba0be03ee01300d192f0770c40d8e47a5ec7d85d22457b72499c8de853a84f698fec8ecb62d74216f02dfd3a98766e413cd302e40c1051421b8a1f324c8e9172640a3cec195d4e97960fcbd631d2958d8e4c579814ded699cd5e27ac87c48fa007e4654dd3d7f73e03167cebf854df6eb3ab58288443dd618c099609fb0ba19da4b4d9611867a4c14b4df39691b40d6fe2567a6316142a368f0e362b99b0dc0a844efe7b30ade205a1f8eb6fe7f28f74ff910bd89d15d70a853823841ace94bd72b488657d2fdf4cc908434c5d1c800bd5463543c874859fc33b7a7011ad23f859e4c", 0xf3}, {&(0x7f0000001d80)="6d721cd9a16e75afab7328cc45c17962b8feeaab20a1733a69c5ecba131d6ada7f91", 0x22}], 0x2, &(0x7f0000003500)=ANY=[@ANYBLOB="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"], 0x198}}, {{&(0x7f0000002000)={0xa, 0x4e24, 0x101, @private1, 0xc3}, 0x1c, &(0x7f0000003480), 0x0, &(0x7f0000003cc0)}}], 0x5, 0x20000000) bind$bt_sco(r1, &(0x7f0000000000)={0x1f, @none}, 0x8) bind$bt_sco(r1, &(0x7f0000001ec0)={0x1f, @none}, 0x8) 04:08:56 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:56 executing program 7: perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x7a, 0xfd, 0x2, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xb6d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000), 0x8000, 0x10441) keyctl$set_timeout(0xf, 0x0, 0x400) 04:08:56 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x4, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x44910, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0x0, 0x0) [ 984.522208] Invalid ELF header len 9 [ 984.533164] Invalid ELF header len 9 04:08:56 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:08:56 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbc4c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x3f, 0x7f, 0x0, 0x10000000, 0x4298, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x28, 0x9, 0x101, 0x1, 0xffffffff, 0x2, 0xb3, 0x0, 0x3ff, 0x0, 0x600000}, r2, 0xa, 0xffffffffffffffff, 0xf) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x44c943, 0x0) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) splice(r3, &(0x7f0000000100)=0x101, r4, &(0x7f0000000140)=0x7f, 0x0, 0x4) keyctl$chown(0x4, r1, 0x0, 0x0) [ 984.572535] loop0: detected capacity change from 0 to 32792 04:08:56 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000000)) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) 04:08:56 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) [ 984.631956] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 984.641241] EXT4-fs (loop0): get root inode failed [ 984.642228] EXT4-fs (loop0): mount failed [ 984.655164] Invalid ELF header len 9 04:08:56 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) [ 984.668782] Invalid ELF header len 9 04:09:05 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:09:05 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:09:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0xa00000) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x6) r2 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) getsockopt$packet_buf(r4, 0x107, 0x6, 0x0, &(0x7f0000000440)) ioctl$TCSBRK(r4, 0x5409, 0x1) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/keycreate\x00', 0x2, 0x0) sendfile(r5, r1, 0x0, 0x7fffffff) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000200)={0x0, 0xe4, "dcdae9e351a2849dd15510f466db0f9a8c0a3e156c788ac642514f709bbb90aa2d2afffe5c5810069147bd3f2117fdd66afe97818f0b77b8a453a24e91aabd61963fb4b33fe42487851c042f0cee81b16e86e8c9e282a1d134279f97eca128b368129432d7d9d3b1fa26e394ee8bdc70f8ac49ab7ba72b19c001f51ea5e723cb6c5698e57d8b446db967c714f0fbceea0ae35177b53824de95cfd400cd073a8538a2be62065a266e90cf309fc782c7bba8c38fa95829f5dc8e8d714708aa5765e2bba470d5531b098d867b266a53b0f638c5ae56f4b9f0b648954aaa116c3bf501c3ffc1"}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bond_slave_0\x00'}) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300), 0x88100, 0x0) sync_file_range(r6, 0x1, 0x5, 0x2) 04:09:05 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) 04:09:05 executing program 7: clock_gettime(0x0, &(0x7f0000000040)) semtimedop(0x0, &(0x7f0000000000)=[{0x4, 0x2, 0x400}, {0x4, 0xfd75, 0x800}], 0x2, &(0x7f0000000080)={0x77359400}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r5, 0xee00, 0xee00) keyctl$chown(0x4, r5, 0x0, 0x0) keyctl$chown(0x4, r5, r3, r2) keyctl$chown(0x4, 0x0, r1, r4) 04:09:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 42) 04:09:05 executing program 6: perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$reject(0x13, r2, 0x100000001, 0x2, r1) keyctl$chown(0x4, r0, 0xee00, 0xee00) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r5, 0x0) r6 = getgid() keyctl$chown(0x4, r4, r5, r6) keyctl$chown(0x4, r0, 0x0, 0x0) 04:09:05 executing program 1: perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x7fffffff}, 0x0, 0x7, 0x0, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.sectors\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f00000003c0)={{r3}, 0x0, 0x26, @unused=[0x4, 0x0, 0x2, 0x401], @devid}) finit_module(r1, 0x0, 0x6) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000200)={"3741726612b916e389d406a227f09055", r4, 0x0, {0x80000001, 0x60d}, {0xba, 0x7f}, 0x401, [0x200, 0x8, 0x5, 0x180000000000000, 0x1ff, 0x1, 0xff, 0x8, 0x6, 0x6, 0x7, 0xb613, 0x5, 0xfffffffffffff7c6, 0xef1e, 0x80]}) 04:09:05 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) [ 993.387034] Invalid ELF header len 9 [ 993.407918] Invalid ELF header len 9 04:09:05 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = getpid() setpriority(0x0, r2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xff, 0x9, 0x2, 0x5, 0x0, 0x7ff, 0x802, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x7f, 0x4}, 0x10400, 0x1, 0x7, 0x6, 0x2, 0xf49, 0x9, 0x0, 0x4, 0x0, 0x401}, r2, 0x4, r0, 0x9) [ 993.427615] loop0: detected capacity change from 0 to 32792 [ 993.429834] FAULT_INJECTION: forcing a failure. [ 993.429834] name failslab, interval 1, probability 0, space 0, times 0 [ 993.431638] CPU: 0 UID: 0 PID: 8446 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 993.431674] Tainted: [W]=WARN [ 993.431682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 993.431695] Call Trace: [ 993.431703] [ 993.431718] dump_stack_lvl+0xfa/0x120 [ 993.431753] should_fail_ex+0x4d7/0x5e0 [ 993.431791] ? kobject_uevent_env+0x22e/0xf90 [ 993.431810] should_failslab+0xc2/0x120 [ 993.431835] __kmalloc_cache_noprof+0x80/0x780 [ 993.431864] ? ___ratelimit+0x3c0/0x910 [ 993.431900] ? kobject_uevent_env+0x22e/0xf90 [ 993.431920] kobject_uevent_env+0x22e/0xf90 [ 993.431947] ? lock_is_held_type+0x9e/0x120 [ 993.431977] loop_configure+0xe31/0x15a0 [ 993.432036] ? __pfx_loop_configure+0x10/0x10 [ 993.432085] ? avc_has_extended_perms+0x107/0xf20 [ 993.432110] ? find_held_lock+0x2b/0x80 [ 993.432144] ? avc_has_extended_perms+0x23b/0xf20 [ 993.432167] ? lock_release+0xc8/0x270 [ 993.432197] lo_ioctl+0x66d/0x1ca0 [ 993.432232] ? __pfx_lo_ioctl+0x10/0x10 [ 993.432257] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 993.432290] ? lock_acquire+0x15e/0x2d0 [ 993.432314] ? __virt_addr_valid+0x1c6/0x5d0 [ 993.432341] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 993.432371] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 993.432399] ? lock_release+0xc8/0x270 [ 993.432426] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 993.432462] ? blkdev_common_ioctl+0x1c3/0x2830 [ 993.432525] ? check_path.constprop.0+0x50/0x50 [ 993.432574] ? __fget_files+0x34/0x3b0 [ 993.432610] ? find_held_lock+0x2b/0x80 [ 993.432642] ? __fget_files+0x203/0x3b0 [ 993.432680] ? __pfx_lo_ioctl+0x10/0x10 [ 993.432706] blkdev_ioctl+0x365/0x6d0 [ 993.432731] ? __pfx_blkdev_ioctl+0x10/0x10 [ 993.432757] ? selinux_file_ioctl+0xb9/0x280 [ 993.432791] ? __pfx_blkdev_ioctl+0x10/0x10 [ 993.432818] __x64_sys_ioctl+0x18f/0x210 [ 993.432852] do_syscall_64+0xbf/0x420 [ 993.432884] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 993.432907] RIP: 0033:0x7f0eb800f8d7 [ 993.432925] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 993.432947] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 993.432970] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb800f8d7 [ 993.432986] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 993.433000] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 993.433014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 993.433027] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 993.433062] 04:09:05 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:09:05 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:09:05 executing program 6: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) dup(r0) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) [ 993.575880] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated 04:09:05 executing program 1: r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) [ 993.602494] EXT4-fs (loop0): get root inode failed [ 993.603313] EXT4-fs (loop0): mount failed [ 993.719169] Invalid ELF header len 9 [ 993.738936] Invalid ELF header len 9 [ 994.238586] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 994.239954] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 994.242478] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 994.243546] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 994.245569] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 994.246680] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 994.248474] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 994.250331] Bluetooth: hci7: Opcode 0x0c1a failed: -4 [ 995.418841] Bluetooth: hci0: command 0x0c1a tx timeout [ 996.250882] Bluetooth: hci7: command 0x0c1a tx timeout [ 996.250984] Bluetooth: hci6: command 0x0c1a tx timeout [ 996.251963] Bluetooth: hci5: command 0x0c1a tx timeout [ 996.252374] Bluetooth: hci4: command 0x0c1a tx timeout [ 996.253373] Bluetooth: hci3: command 0x0c1a tx timeout [ 996.253765] Bluetooth: hci2: command 0x0c1a tx timeout [ 996.254681] Bluetooth: hci1: command 0x0c1a tx timeout 04:09:16 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) keyctl$chown(0x4, r0, r1, r2) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000200)=0x10) ioctl$F2FS_IOC_DEFRAGMENT(r3, 0xc010f508, &(0x7f0000000240)={0x3, 0x6621}) 04:09:16 executing program 5: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:09:16 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) keyctl$chown(0x4, r0, 0x0, 0x0) 04:09:16 executing program 2: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x1000, &(0x7f0000000000)) sync() sync() r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x6) fcntl$setown(r0, 0x8, 0xffffffffffffffff) 04:09:16 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26ab80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r2 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0x1f, 0x9, 0xd1, 0x0, 0x4, 0x20010, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000280), 0x2}, 0x141, 0x7, 0x2, 0x0, 0x2, 0x2, 0x4000, 0x0, 0x24000, 0x0, 0x6}, 0xffffffffffffffff, 0x0, r3, 0x8) ftruncate(r2, 0x9) finit_module(r2, 0x0, 0x6) r4 = syz_open_dev$usbmon(&(0x7f0000000200), 0xe, 0x40000) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000240)={0x0, 0x2, 0x8, 0x80}) close_range(r2, r0, 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x0) ftruncate(r1, 0x1000) socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) r6 = dup3(0xffffffffffffffff, r5, 0x0) getsockopt$packet_buf(r6, 0x107, 0x6, 0x0, &(0x7f0000000440)) mount_setattr(r6, &(0x7f0000000000)='./file0\x00', 0x1100, &(0x7f0000000040)={0x100041, 0x8}, 0x20) 04:09:16 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:09:16 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x5, 0x40, 0x1, 0x1f, 0x0, 0x200, 0x1003, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000000040), 0x9}, 0x240, 0x1f, 0x80000001, 0x8, 0x1, 0x9, 0xeff1, 0x0, 0x2, 0x0, 0x2808}, 0x0, 0xa, r2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x80080, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r5) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) 04:09:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 43) [ 1004.006959] Invalid ELF header len 9 04:09:16 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) [ 1004.044331] loop0: detected capacity change from 0 to 32792 04:09:16 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x9) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/128, 0x80}, {&(0x7f0000000040)=""/31, 0x1f}, {&(0x7f0000000280)=""/82, 0x52}, {&(0x7f00000003c0)=""/235, 0xeb}], 0x4, 0x78, 0x8) r2 = socket(0x3, 0x2, 0x2) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r2, 0x8008f511, &(0x7f00000004c0)) finit_module(r1, 0x0, 0x0) [ 1004.096206] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1004.099854] EXT4-fs (loop0): get root inode failed [ 1004.100284] EXT4-fs (loop0): mount failed 04:09:16 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:09:16 executing program 5: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) [ 1004.172708] Invalid ELF header len 9 04:09:16 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x8, 0x35}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r1, 0xee00, 0xee00) keyctl$chown(0x4, r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r4, 0x0) keyctl$chown(0x4, r0, r4, r3) setresuid(0x0, r2, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{{&(0x7f0000000300), 0x6e, &(0x7f00000014c0)=[{&(0x7f00000013c0)=""/71, 0x47}, {&(0x7f0000001440)=""/111, 0x6f}, {&(0x7f0000000380)=""/28, 0x1c}], 0x3, &(0x7f0000001500)=ANY=[@ANYBLOB="ff020000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x30}}, {{&(0x7f0000001540), 0x6e, &(0x7f0000001bc0)=[{&(0x7f00000015c0)=""/92, 0x5c}, {&(0x7f0000001640)=""/186, 0xba}, {&(0x7f0000001700)=""/45, 0x2d}, {&(0x7f0000001740)=""/208, 0xd0}, {&(0x7f0000001840)=""/131, 0x83}, {&(0x7f0000001900)=""/183, 0xb7}, {&(0x7f00000019c0)=""/249, 0xf9}, {0xfffffffffffffffc}, {&(0x7f0000001ac0)=""/234, 0xea}], 0x9, &(0x7f0000001c80)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001cc0)=@abs, 0x6e, &(0x7f0000002f80)=[{&(0x7f0000001d40)=""/70, 0x46}, {&(0x7f0000001dc0)}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/96, 0x60}, {&(0x7f0000002e80)=""/6, 0x6}, {&(0x7f0000002ec0)=""/192, 0xc0}], 0x6, &(0x7f0000003000)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000004180)=[{&(0x7f00000030c0)=""/158, 0x9e}, {&(0x7f0000003180)=""/4096, 0x1000}], 0x2, &(0x7f00000041c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000004200)=@abs, 0x6e, &(0x7f0000004380)=[{&(0x7f0000004280)=""/162, 0xa2}, {&(0x7f0000004340)=""/55, 0x37}], 0x2, &(0x7f00000043c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}, {{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f0000004480)=""/231, 0xe7}, {&(0x7f0000004580)=""/149, 0x95}, {&(0x7f0000004640)=""/244, 0xf4}, {&(0x7f0000004740)=""/12, 0xc}, {&(0x7f0000004780)=""/39, 0x27}, {&(0x7f00000047c0)=""/83, 0x53}, {&(0x7f0000004840)=""/133, 0x85}, {&(0x7f0000004900)=""/111, 0x6f}, {&(0x7f0000004980)=""/174, 0xae}, {&(0x7f0000004a40)=""/171, 0xab}], 0xa, &(0x7f0000004bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}], 0x6, 0x40010063, &(0x7f0000004e00)) keyctl$chown(0x4, r1, r2, r5) r6 = add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="b4603205138766d598d80cfa2ced8289315dace6157e556d399a", 0x1a, r0) r7 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000003c0)="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", 0x1000, r6) getresuid(&(0x7f0000000140), &(0x7f0000000280), &(0x7f00000002c0)=0x0) keyctl$chown(0x4, r7, r8, 0x0) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000001dc0)='\\o+}^\x00') 04:09:16 executing program 7: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0xee00) keyctl$chown(0x4, r0, 0x0, 0x0) 04:09:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 44) 04:09:16 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000), 0x17, 0x2b8f02) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x1ff) r2 = syz_io_uring_setup(0x6d3c, &(0x7f0000000680)={0x0, 0x9c60, 0x4, 0x2, 0x80145, 0x0, r1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000004c0), &(0x7f0000000180)) r3 = epoll_create1(0x0) r4 = syz_open_dev$sg(&(0x7f0000000080), 0x7, 0x0) r5 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) r6 = dup2(r4, r5) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) r7 = syz_open_procfs$userns(0x0, &(0x7f0000000540)) r8 = socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x1ff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f0000000140)={'wlan1\x00', 0x0}) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_FRAME(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000c40)=ANY=[@ANYRES64=r2, @ANYRES16=r11, @ANYRES16, @ANYRES32=r10, @ANYBLOB="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"], 0x28}}, 0x0) ppoll(&(0x7f0000000700)=[{r5, 0x1081}, {r6, 0x8000}, {r0, 0x4001}, {r9, 0x48}, {0xffffffffffffffff, 0x2004}, {r0, 0x96c2}, {r7, 0x2204}, {r7, 0xa8}, {r3, 0x2}, {r8, 0x2321}], 0xa, &(0x7f0000000600), &(0x7f0000000640)={[0x3]}, 0x8) sync() 04:09:16 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) 04:09:16 executing program 5: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 04:09:16 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f00000003c0)={0x1, 0x0, @status={[0x400, 0x2, 0xaa3, 0xffff, 0x5, 0x7]}, [0x7fffffff, 0x7fffffff, 0x2, 0x9, 0x81, 0xbe6, 0x1f, 0x80000000, 0x0, 0x8, 0x0, 0x2, 0x7, 0x100000000, 0x7, 0x9, 0x1, 0x0, 0x8000, 0x7f, 0x800, 0x100000001, 0x8, 0x401, 0x0, 0x3, 0xe0000, 0x6, 0xdcae, 0x6, 0x0, 0x80000001, 0x7fff, 0x4a4, 0x66, 0x6, 0x1c6, 0x1, 0xfff, 0xbd6, 0x1, 0x3, 0x5, 0xffffffff00000001, 0x3, 0x4, 0x7fffffff, 0x1, 0x80000001, 0x9, 0xe46, 0x4, 0x1, 0x0, 0x2, 0xfff, 0xffff, 0x8, 0x3, 0x800, 0x4, 0x81, 0xfffffffffffffffc, 0x100]}) ftruncate(r0, 0x9) finit_module(r0, 0x0, 0x0) [ 1004.405245] FAULT_INJECTION: forcing a failure. [ 1004.405245] name failslab, interval 1, probability 0, space 0, times 0 [ 1004.406834] CPU: 0 UID: 0 PID: 8533 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 1004.406853] Tainted: [W]=WARN [ 1004.406857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1004.406864] Call Trace: [ 1004.406868] [ 1004.406872] dump_stack_lvl+0xfa/0x120 [ 1004.406894] should_fail_ex+0x4d7/0x5e0 [ 1004.406914] should_failslab+0xc2/0x120 [ 1004.406927] kmem_cache_alloc_node_noprof+0x87/0x780 [ 1004.406943] ? lockdep_hardirqs_on_prepare+0xdb/0x190 [ 1004.406957] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 1004.406976] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1004.406993] ? alloc_unbound_pwq+0xa51/0xe20 [ 1004.407013] ? alloc_unbound_pwq+0xa51/0xe20 [ 1004.407028] alloc_unbound_pwq+0xa51/0xe20 [ 1004.407050] apply_wqattrs_prepare+0x851/0xb60 [ 1004.407074] apply_workqueue_attrs_locked+0x64/0xf0 [ 1004.407091] __alloc_workqueue+0x105c/0x1820 [ 1004.407116] alloc_workqueue_noprof+0xc7/0x200 [ 1004.407135] ? __pfx_alloc_workqueue_noprof+0x10/0x10 [ 1004.407155] ? lock_release+0xc8/0x270 [ 1004.407177] loop_configure+0xf68/0x15a0 [ 1004.407197] ? 0xffffffffa0000000 [ 1004.407206] ? __is_insn_slot_addr+0x140/0x290 [ 1004.407220] ? kernel_text_address+0x5b/0xc0 [ 1004.407233] ? unwind_get_return_address+0x59/0xa0 [ 1004.407246] ? __kernel_text_address+0xd/0x40 [ 1004.407262] ? unwind_get_return_address+0x59/0xa0 [ 1004.407274] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1004.407291] ? arch_stack_walk+0x9c/0xf0 [ 1004.407305] ? __pfx_loop_configure+0x10/0x10 [ 1004.407320] ? perf_trace_lock+0xb5/0x5d0 [ 1004.407332] ? __lock_acquire+0x451/0x2250 [ 1004.407348] ? __pfx_perf_trace_lock+0x10/0x10 [ 1004.407360] ? stack_trace_save+0x8e/0xc0 [ 1004.407377] ? lock_acquire+0x15e/0x2d0 [ 1004.407389] ? avc_has_extended_perms+0x107/0xf20 [ 1004.407402] ? find_held_lock+0x2b/0x80 [ 1004.407418] ? avc_has_extended_perms+0x23b/0xf20 [ 1004.407430] ? lock_release+0xc8/0x270 [ 1004.407445] lo_ioctl+0x66d/0x1ca0 [ 1004.407462] ? __pfx_lo_ioctl+0x10/0x10 [ 1004.407474] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1004.407491] ? lock_acquire+0x15e/0x2d0 [ 1004.407503] ? __virt_addr_valid+0x1c6/0x5d0 [ 1004.407516] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1004.407532] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1004.407545] ? lock_release+0xc8/0x270 [ 1004.407559] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1004.407576] ? blkdev_common_ioctl+0x1c3/0x2830 [ 1004.407609] ? check_path.constprop.0+0x50/0x50 [ 1004.407627] ? __fget_files+0x34/0x3b0 [ 1004.407646] ? find_held_lock+0x2b/0x80 [ 1004.407662] ? __fget_files+0x203/0x3b0 [ 1004.407681] ? __pfx_lo_ioctl+0x10/0x10 [ 1004.407694] blkdev_ioctl+0x365/0x6d0 [ 1004.407710] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1004.407723] ? selinux_file_ioctl+0xb9/0x280 [ 1004.407741] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1004.407754] __x64_sys_ioctl+0x18f/0x210 [ 1004.407772] do_syscall_64+0xbf/0x420 [ 1004.407789] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1004.407801] RIP: 0033:0x7f0eb800f8d7 [ 1004.407809] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1004.407820] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1004.407832] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb800f8d7 [ 1004.407840] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1004.407847] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1004.407854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1004.407861] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 1004.407879] 04:09:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) getsockopt$packet_buf(r2, 0x107, 0x6, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0xffffffff}}, './file0\x00'}) sendmsg$nl_generic(r3, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000001040)={0x1164, 0x22, 0x400, 0x70bd2d, 0x25dfdbfd, {0x4}, [@generic="d74cb049ede134b4b7be44a9d2670cf92bb3ccdaacf143114b9fe6dd6867e09ef48d312947e5f738972fd69b29d5013b4f43f84cc4ad50d6be7d38cbf65a1006b9b4448f7b12f00edce2c64470d2bebe935da6f43a232dd89bcb381e1c48afb5d219c9af10a108c9c21ca7c4413c28a2dd70477440a2f548af82f48dd12c2f557d90413d503beae4accbc8e0260983706869ba1f4b288ae86fc655dcb32450f1c9b6247076a4cfce6434cdac15de106f968c1834119d93d75911df0ee8d29a7aaecac9288ca6542f0c115a40055f8a23", @generic="e5ed0bf85727e4c6a90cd5bc3b3ec38fd30b2d8bdb2c32163be605b80c8ba715873e799eaa58ddd10cbdf80953e4a109c9cc55d67f30e915b89866df9f343bcf75abaddca5c62790f4afa31b9bfa5025cc57d41807e4148d0e2f9999065d6b865f02c6ad4658f564b29f89146c364a7c9902ca610a724c6f40d77d4266fd9bdc", @generic="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"]}, 0x1164}, 0x1, 0x0, 0x0, 0x40800}, 0x880) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r4, 0x0, 0x0) 04:09:16 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) [ 1004.489431] Invalid ELF header len 9 [ 1004.512501] Invalid ELF header len 9 [ 1014.359575] FAULT_INJECTION: forcing a failure. [ 1014.359575] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.360640] CPU: 1 UID: 0 PID: 8549 Comm: syz-executor.0 Tainted: G W 6.18.0-next-20251210 #1 PREEMPT(voluntary) [ 1014.360659] Tainted: [W]=WARN [ 1014.360663] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.360671] Call Trace: [ 1014.360675] [ 1014.360679] dump_stack_lvl+0xfa/0x120 [ 1014.360701] should_fail_ex+0x4d7/0x5e0 [ 1014.360732] should_failslab+0xc2/0x120 [ 1014.360745] __kmalloc_node_track_caller_noprof+0xd7/0x890 [ 1014.360785] ? __pfx_vsnprintf+0x10/0x10 [ 1014.360800] ? kasprintf+0xbe/0x100 [ 1014.360828] ? kvasprintf+0xbd/0x160 [ 1014.360848] kvasprintf+0xbd/0x160 [ 1014.360869] ? __pfx_kvasprintf+0x10/0x10 [ 1014.360893] ? lock_acquire+0x15e/0x2d0 [ 1014.360909] ? __is_module_percpu_address+0x2c/0x400 [ 1014.360938] kasprintf+0xbe/0x100 [ 1014.360959] ? __pfx_kasprintf+0x10/0x10 [ 1014.360981] ? __is_module_percpu_address+0x272/0x400 [ 1014.361006] alloc_workqueue_noprof+0x10b/0x200 [ 1014.361026] ? __pfx_alloc_workqueue_noprof+0x10/0x10 [ 1014.361046] ? lock_release+0xc8/0x270 [ 1014.361068] loop_configure+0xf68/0x15a0 [ 1014.361088] ? 0xffffffffa0000000 [ 1014.361098] ? __is_insn_slot_addr+0x140/0x290 [ 1014.361113] ? kernel_text_address+0x5b/0xc0 [ 1014.361126] ? unwind_get_return_address+0x59/0xa0 [ 1014.361139] ? __kernel_text_address+0xd/0x40 [ 1014.361152] ? unwind_get_return_address+0x59/0xa0 [ 1014.361163] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1014.361179] ? arch_stack_walk+0x9c/0xf0 [ 1014.361193] ? __pfx_loop_configure+0x10/0x10 [ 1014.361207] ? perf_trace_lock+0xb5/0x5d0 [ 1014.361220] ? __lock_acquire+0x451/0x2250 [ 1014.361236] ? __pfx_perf_trace_lock+0x10/0x10 [ 1014.361248] ? stack_trace_save+0x8e/0xc0 [ 1014.361265] ? lock_acquire+0x15e/0x2d0 [ 1014.361277] ? avc_has_extended_perms+0x107/0xf20 [ 1014.361290] ? find_held_lock+0x2b/0x80 [ 1014.361307] ? avc_has_extended_perms+0x23b/0xf20 [ 1014.361319] ? lock_release+0xc8/0x270 [ 1014.361334] lo_ioctl+0x66d/0x1ca0 [ 1014.361351] ? __pfx_lo_ioctl+0x10/0x10 [ 1014.361364] ? __pfx_avc_has_extended_perms+0x10/0x10 [ 1014.361380] ? lock_acquire+0x15e/0x2d0 [ 1014.361392] ? __virt_addr_valid+0x1c6/0x5d0 [ 1014.361406] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.361422] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1014.361436] ? lock_release+0xc8/0x270 [ 1014.361449] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1014.361467] ? blkdev_common_ioctl+0x1c3/0x2830 [ 1014.361500] ? check_path.constprop.0+0x50/0x50 [ 1014.361518] ? __fget_files+0x34/0x3b0 [ 1014.361537] ? find_held_lock+0x2b/0x80 [ 1014.361553] ? __fget_files+0x203/0x3b0 [ 1014.361572] ? __pfx_lo_ioctl+0x10/0x10 [ 1014.361585] blkdev_ioctl+0x365/0x6d0 [ 1014.361597] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1014.361610] ? selinux_file_ioctl+0xb9/0x280 [ 1014.361628] ? __pfx_blkdev_ioctl+0x10/0x10 [ 1014.361642] __x64_sys_ioctl+0x18f/0x210 [ 1014.361661] do_syscall_64+0xbf/0x420 [ 1014.361677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1014.361690] RIP: 0033:0x7f0eb800f8d7 [ 1014.361698] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.361710] RSP: 002b:00007f0eb5584f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1014.361722] RAX: ffffffffffffffda RBX: 00007f0eb8059970 RCX: 00007f0eb800f8d7 [ 1014.361729] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1014.361736] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1014.361743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1014.361750] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 1014.361767] 04:09:26 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001a00), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000640), r4) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000a80)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEV(r6, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000200)={0x1c, r5, 0x1, 0x0, 0x0, {0x23}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r2, 0x634, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000010}, 0x20004804) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r8, 0xee00, 0xee00) keyctl$chown(0x4, r8, 0x0, 0x0) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000300)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r9, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r5, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4) 04:09:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x7, 0x13, r0, 0x0) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f00000000c0), 0x0, 0x4) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff6000/0x1000)=nil, 0x1000, 0x2000002, 0x1b0013, r0, 0x0) creat(&(0x7f0000000180)='./file1\x00', 0x14) syz_io_uring_submit(r2, 0x0, &(0x7f0000000080)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x4) madvise(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0x15) creat(&(0x7f0000000000)='./file1\x00', 0x0) 04:09:26 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x2200, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r2, 0xee00, 0xee00) keyctl$chown(0x4, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r3, 0xee00, 0xee00) keyctl$chown(0x4, r3, 0x0, 0x0) keyctl$unlink(0x9, r2, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000200)=ANY=[@ANYBLOB="0179b7054c1aa340002000d79bb38cf6a3754a2fe90000", @ANYRESOCT, @ANYBLOB='\x00\x00\x00']) close_range(r0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, r1, 0xee00, 0xee00) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x20402, 0x0) r5 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r5, 0x9) finit_module(r5, 0x0, 0x6) close_range(r4, r5, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x4840, 0x0) keyctl$reject(0x13, r1, 0x3ff, 0x100000001, r1) 04:09:26 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) finit_module(r1, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) sendfile(r2, r0, &(0x7f0000000200)=0x20, 0x7ff) 04:09:26 executing program 5: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) [ 1014.393615] Invalid ELF header len 9 [ 1014.396383] Invalid ELF header len 9 04:09:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000000040)="000000000000000000000000efdd79b7c3654313ac0cec53e79dcbaf010040", 0x1f, 0x4e0}, {&(0x7f0000000140)="37a454a0f018907864f71585fb0445241feba7135942c6a6db6ad39397b286396b669aff59cfd93b94c3ae9c8feb98620ebf6ac670a65b72fa2bdce9cefe669ccd5c22156f02b2e39aa9d936491de6321dd2d102e5aea49e90badcb668df640613863956e146dc3f780d3b9ac0b39c7f41cb1d1638bcb14070bff9f7f4ffcec7ec8db95ed364f3861efb8744e4feb1a7b3589064687985a2d6002aec", 0x9c, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {0x0, 0x0, 0x8000000001800}], 0x0, &(0x7f0000013800)) (fail_nth: 45) 04:09:26 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) 04:09:26 executing program 7: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/consoles\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r3, 0x9) finit_module(r3, 0x0, 0x6) r4 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r4, 0x9) finit_module(r4, 0x0, 0x6) r5 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r5, 0x9) finit_module(r5, 0x0, 0x6) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[0xffffffffffffffff, r2, r3, r4, r0, r5], 0x6) keyctl$chown(0x4, r1, 0xee00, 0xee00) creat(&(0x7f0000000000)='\x00', 0x20) keyctl$chown(0x4, r1, 0x0, 0x0) 04:09:26 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00\x14~\xfe\x9a!\xb2\xb73h\xd2oR\arV(C\xe7\xbb\xd3\x83\xd4\x9b\xb7\xc8t_X\xf0\xcb\xba_\x82qgk\xcbW\xe7\xcd\x87\xf9\xb2\x89\xb94\x06s\xa1B\x96\xc4\x17\x11\xba\xae\xba/N~%\xaf\xcbw\xa4\xd99\xab)\x8f\x1b2\x1bJ\x86\xb1\xee\x8d;\x12\xd4\x7fT\x06\xaakm^\x85\xd1\xd1\xcd\x98L2\xe3\x14\xb7v\xbb\x94x\x82\xab\xc1dK(\x99/9\xc6\xbe\xcd?\xd6-%\x8b\xbeiSA\xdc\xaa\xec\xban3\xbf\x8ew\xee\x91SB\xb0\xb5\xc4,f\xf0\xca\xb3\xb0\xa5\x02\x1f\xd4\xf8\xe7_A\xf0b\xa4\xec\xe8\xeed\xaf\xdf\xdf-w]_\xe4\xb8\x9850\xcd\x8f*\xb5\x98>Y\xef.5\xfd\xcbC\xf0(=\'\xaa^kD\xf5\x81f\xd0 i\x84\xb2\xc5\x1d\x96\xa5\v\xaf\x18w|J\xdbE\x80\x97\xe9U\xd8\x01[A\xaa\xc1%\xa95^X\xea\x17\x1f&]K\xc4\xe6\x17\x00\x04\xfe\x12o\xf0\xad\xfa\xa8\x81\xdd\xe8\t\xa12P\xfc@\x1a\xea\x92|\x04W\xd6-\xb22S`[oUAY\xa8\x93\xc5H\xbe\xc4\x95\x87\x9b\x05\x80\xfc\xec1\xcd\xe4\x8e\xb8\xb0\xdf\xfd\xd2\x19\xf0\x0e\x98{\x9f\f\xd3\xc3\x8e\xdb\xdf\x86$\x8a\xf1\t\x8a\xa8}\xf27\x9c6\xe5\x05\xe5\t\xb8', 0x0) ftruncate(r1, 0x9) sendfile(r0, r0, &(0x7f0000000000)=0x1, 0x1ff) finit_module(r1, 0x0, 0x0) 04:09:26 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000040)) [ 1014.477678] Invalid ELF header len 9 [ 1014.482133] loop0: detected capacity change from 0 to 32792 [ 1014.486160] Invalid ELF header len 9 [ 1014.539583] EXT4-fs error (device loop0): __ext4_fill_super:5553: inode #2: comm syz-executor.0: iget: special inode unallocated [ 1014.545145] EXT4-fs (loop0): get root inode failed [ 1014.545551] EXT4-fs (loop0): mount failed [ 1018.541400] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object (percpu) 0x607f1a8d9238 (size 8): comm "syz-executor.0", pid 8533, jiffies 4295671002 hex dump (first 8 bytes on cpu 1): 00 00 00 00 00 00 00 00 ........ backtrace (crc 0): pcpu_alloc_noprof+0x8c6/0x1160 __alloc_workqueue+0x7d6/0x1820 alloc_workqueue_noprof+0xc7/0x200 loop_configure+0xf68/0x15a0 lo_ioctl+0x66d/0x1ca0 blkdev_ioctl+0x365/0x6d0 __x64_sys_ioctl+0x18f/0x210 do_syscall_64+0xbf/0x420 entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed VM DIAGNOSIS: 04:09:42 Registers: info registers vcpu 0 RAX=0000000000758c15 RBX=0000000000000000 RCX=ffffffff84cba997 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff814d37e0 RBP=dffffc0000000000 RSP=ffffffff85c07e00 R8 =0000000000000001 R9 =ffffed100d9c63da R10=ffff88806ce31ed3 R11=0000000000000001 R12=ffffffff86664750 R13=1ffffffff0b80fc7 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84cb939e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e535c000 00000000 00000000 LDT=0000 fffffe7400000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055c66895f618 CR3=000000000dfe8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=656a626f206465636e6572656665726e XMM02=657a6973282038333239643861316637 XMM03=6970202c22302e726f7475636578652d XMM04=20200a2e2e2e2e2e2e2e2e2020202020 XMM05=20202020203030203030203030203030 XMM06=0a3a293120757063206e6f2073657479 XMM07=78656820200a32303031373635393234 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=000000000025a37d RBX=0000000000000001 RCX=ffffffff84cba997 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff814d37e0 RBP=dffffc0000000000 RSP=ffff8880096efe58 R8 =0000000000000001 R9 =ffffed100d9e63da R10=ffff88806cf31ed3 R11=0000000000000001 R12=ffffffff86664750 R13=1ffff110012ddfd2 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84cb939e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e545c000 00000000 00000000 LDT=0000 ffff888000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc1de83db8 CR3=000000000dfe8000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=554dac981d95fccffb54ee2d0a58a0de XMM02=6d2d4b3a9d8b28ea64bb32302a90e44d XMM03=c668709daa8cd7c04eb3697e7e37120b XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=0e0d0c0f0a09080b0605040702010003 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000