Warning: Permanently added '[localhost]:39562' (ECDSA) to the list of known hosts. 2022/09/13 14:54:36 fuzzer started 2022/09/13 14:54:37 dialing manager at localhost:36597 syzkaller login: [ 44.219990] cgroup: Unknown subsys name 'net' [ 44.329451] cgroup: Unknown subsys name 'rlimit' 2022/09/13 14:54:51 syscalls: 2215 2022/09/13 14:54:51 code coverage: enabled 2022/09/13 14:54:51 comparison tracing: enabled 2022/09/13 14:54:51 extra coverage: enabled 2022/09/13 14:54:51 setuid sandbox: enabled 2022/09/13 14:54:51 namespace sandbox: enabled 2022/09/13 14:54:51 Android sandbox: enabled 2022/09/13 14:54:51 fault injection: enabled 2022/09/13 14:54:51 leak checking: enabled 2022/09/13 14:54:51 net packet injection: enabled 2022/09/13 14:54:51 net device setup: enabled 2022/09/13 14:54:51 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/13 14:54:51 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/13 14:54:51 USB emulation: enabled 2022/09/13 14:54:51 hci packet injection: enabled 2022/09/13 14:54:51 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220913) 2022/09/13 14:54:51 802.15.4 emulation: enabled 2022/09/13 14:54:51 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/13 14:54:51 fetching corpus: 31, signal 19411/23059 (executing program) 2022/09/13 14:54:51 fetching corpus: 74, signal 38328/43269 (executing program) 2022/09/13 14:54:51 fetching corpus: 124, signal 46132/52457 (executing program) 2022/09/13 14:54:51 fetching corpus: 174, signal 53593/61184 (executing program) 2022/09/13 14:54:51 fetching corpus: 224, signal 62005/70664 (executing program) 2022/09/13 14:54:51 fetching corpus: 274, signal 73052/82458 (executing program) 2022/09/13 14:54:52 fetching corpus: 324, signal 79409/89707 (executing program) 2022/09/13 14:54:52 fetching corpus: 374, signal 84376/95586 (executing program) 2022/09/13 14:54:52 fetching corpus: 424, signal 91361/103256 (executing program) 2022/09/13 14:54:52 fetching corpus: 474, signal 95879/108476 (executing program) 2022/09/13 14:54:52 fetching corpus: 524, signal 99911/113210 (executing program) 2022/09/13 14:54:52 fetching corpus: 574, signal 103391/117386 (executing program) 2022/09/13 14:54:52 fetching corpus: 624, signal 106461/121155 (executing program) 2022/09/13 14:54:53 fetching corpus: 674, signal 109153/124518 (executing program) 2022/09/13 14:54:53 fetching corpus: 724, signal 112122/128093 (executing program) 2022/09/13 14:54:53 fetching corpus: 774, signal 115581/132049 (executing program) 2022/09/13 14:54:53 fetching corpus: 824, signal 117961/135042 (executing program) 2022/09/13 14:54:53 fetching corpus: 874, signal 121407/138850 (executing program) 2022/09/13 14:54:53 fetching corpus: 924, signal 123055/141072 (executing program) 2022/09/13 14:54:54 fetching corpus: 974, signal 125780/144213 (executing program) 2022/09/13 14:54:54 fetching corpus: 1024, signal 126834/145970 (executing program) 2022/09/13 14:54:54 fetching corpus: 1074, signal 128841/148415 (executing program) 2022/09/13 14:54:54 fetching corpus: 1124, signal 130871/150809 (executing program) 2022/09/13 14:54:54 fetching corpus: 1174, signal 132698/153078 (executing program) 2022/09/13 14:54:54 fetching corpus: 1224, signal 135047/155691 (executing program) 2022/09/13 14:54:54 fetching corpus: 1274, signal 137380/158234 (executing program) 2022/09/13 14:54:55 fetching corpus: 1324, signal 139011/160243 (executing program) 2022/09/13 14:54:55 fetching corpus: 1374, signal 141651/162980 (executing program) 2022/09/13 14:54:55 fetching corpus: 1424, signal 144724/165931 (executing program) 2022/09/13 14:54:55 fetching corpus: 1474, signal 146120/167639 (executing program) 2022/09/13 14:54:55 fetching corpus: 1524, signal 147450/169221 (executing program) 2022/09/13 14:54:55 fetching corpus: 1574, signal 148656/170768 (executing program) 2022/09/13 14:54:56 fetching corpus: 1624, signal 150974/173083 (executing program) 2022/09/13 14:54:56 fetching corpus: 1674, signal 151902/174407 (executing program) 2022/09/13 14:54:56 fetching corpus: 1724, signal 153487/176180 (executing program) 2022/09/13 14:54:56 fetching corpus: 1774, signal 154665/177613 (executing program) 2022/09/13 14:54:56 fetching corpus: 1824, signal 156148/179241 (executing program) 2022/09/13 14:54:56 fetching corpus: 1874, signal 157471/180710 (executing program) 2022/09/13 14:54:56 fetching corpus: 1924, signal 159094/182393 (executing program) 2022/09/13 14:54:57 fetching corpus: 1974, signal 160646/183906 (executing program) 2022/09/13 14:54:57 fetching corpus: 2024, signal 162216/185451 (executing program) 2022/09/13 14:54:57 fetching corpus: 2074, signal 163702/186852 (executing program) 2022/09/13 14:54:57 fetching corpus: 2124, signal 164682/187991 (executing program) 2022/09/13 14:54:57 fetching corpus: 2174, signal 165784/189154 (executing program) 2022/09/13 14:54:57 fetching corpus: 2224, signal 167211/190495 (executing program) 2022/09/13 14:54:57 fetching corpus: 2274, signal 169781/192535 (executing program) 2022/09/13 14:54:58 fetching corpus: 2324, signal 171340/193944 (executing program) 2022/09/13 14:54:58 fetching corpus: 2374, signal 172414/195023 (executing program) 2022/09/13 14:54:58 fetching corpus: 2424, signal 173284/195980 (executing program) 2022/09/13 14:54:58 fetching corpus: 2474, signal 174666/197147 (executing program) 2022/09/13 14:54:58 fetching corpus: 2524, signal 175293/197918 (executing program) 2022/09/13 14:54:58 fetching corpus: 2574, signal 177039/199238 (executing program) 2022/09/13 14:54:58 fetching corpus: 2624, signal 178012/200114 (executing program) 2022/09/13 14:54:59 fetching corpus: 2674, signal 179289/201134 (executing program) 2022/09/13 14:54:59 fetching corpus: 2724, signal 180324/202027 (executing program) 2022/09/13 14:54:59 fetching corpus: 2774, signal 181802/203116 (executing program) 2022/09/13 14:54:59 fetching corpus: 2824, signal 182713/203975 (executing program) 2022/09/13 14:54:59 fetching corpus: 2874, signal 183547/204763 (executing program) 2022/09/13 14:54:59 fetching corpus: 2924, signal 184431/205486 (executing program) 2022/09/13 14:54:59 fetching corpus: 2974, signal 185230/206180 (executing program) 2022/09/13 14:55:00 fetching corpus: 3024, signal 186137/206930 (executing program) 2022/09/13 14:55:00 fetching corpus: 3074, signal 187645/207895 (executing program) 2022/09/13 14:55:00 fetching corpus: 3124, signal 188549/208632 (executing program) 2022/09/13 14:55:00 fetching corpus: 3174, signal 189357/209282 (executing program) 2022/09/13 14:55:00 fetching corpus: 3224, signal 190033/209851 (executing program) 2022/09/13 14:55:00 fetching corpus: 3274, signal 190861/210468 (executing program) 2022/09/13 14:55:00 fetching corpus: 3324, signal 191654/211138 (executing program) 2022/09/13 14:55:01 fetching corpus: 3374, signal 192333/211697 (executing program) 2022/09/13 14:55:01 fetching corpus: 3424, signal 193094/212252 (executing program) 2022/09/13 14:55:01 fetching corpus: 3474, signal 193802/212835 (executing program) 2022/09/13 14:55:01 fetching corpus: 3524, signal 194808/213409 (executing program) 2022/09/13 14:55:01 fetching corpus: 3574, signal 195784/213970 (executing program) 2022/09/13 14:55:01 fetching corpus: 3624, signal 196521/214461 (executing program) 2022/09/13 14:55:01 fetching corpus: 3674, signal 197814/215115 (executing program) 2022/09/13 14:55:02 fetching corpus: 3724, signal 198325/215559 (executing program) 2022/09/13 14:55:02 fetching corpus: 3774, signal 199116/216024 (executing program) 2022/09/13 14:55:02 fetching corpus: 3824, signal 199943/216529 (executing program) 2022/09/13 14:55:02 fetching corpus: 3874, signal 200988/217053 (executing program) 2022/09/13 14:55:02 fetching corpus: 3924, signal 201674/217449 (executing program) 2022/09/13 14:55:02 fetching corpus: 3974, signal 202553/217880 (executing program) 2022/09/13 14:55:02 fetching corpus: 4024, signal 203418/218263 (executing program) 2022/09/13 14:55:03 fetching corpus: 4074, signal 204097/218631 (executing program) 2022/09/13 14:55:03 fetching corpus: 4124, signal 205461/219133 (executing program) 2022/09/13 14:55:03 fetching corpus: 4174, signal 206361/219516 (executing program) 2022/09/13 14:55:03 fetching corpus: 4224, signal 206943/219811 (executing program) 2022/09/13 14:55:03 fetching corpus: 4274, signal 207802/220186 (executing program) 2022/09/13 14:55:03 fetching corpus: 4324, signal 208168/220422 (executing program) 2022/09/13 14:55:04 fetching corpus: 4374, signal 209404/220777 (executing program) 2022/09/13 14:55:04 fetching corpus: 4424, signal 210021/221019 (executing program) 2022/09/13 14:55:04 fetching corpus: 4474, signal 210777/221274 (executing program) 2022/09/13 14:55:04 fetching corpus: 4524, signal 211338/221502 (executing program) 2022/09/13 14:55:04 fetching corpus: 4574, signal 212063/221747 (executing program) 2022/09/13 14:55:04 fetching corpus: 4624, signal 212563/221968 (executing program) 2022/09/13 14:55:04 fetching corpus: 4674, signal 213152/222150 (executing program) 2022/09/13 14:55:05 fetching corpus: 4724, signal 213609/222313 (executing program) 2022/09/13 14:55:05 fetching corpus: 4774, signal 214255/222482 (executing program) 2022/09/13 14:55:05 fetching corpus: 4824, signal 214945/222665 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/222739 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/222808 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/222892 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/222971 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/223039 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/223114 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/223214 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/223285 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/223371 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/223440 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/223487 (executing program) 2022/09/13 14:55:05 fetching corpus: 4845, signal 215091/223487 (executing program) 2022/09/13 14:55:08 starting 8 fuzzer processes 14:55:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, 0x0, 0x0) 14:55:08 executing program 3: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc) 14:55:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 14:55:08 executing program 2: prctl$PR_SET_MM_EXE_FILE(0x35, 0xd, 0xffffffffffffffff) 14:55:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x5, &(0x7f0000003bc0), 0x0) 14:55:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000480)={@mcast1, @mcast1, @local, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1000110}) [ 75.251019] audit: type=1400 audit(1663080908.474:6): avc: denied { execmem } for pid=286 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 14:55:08 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 14:55:08 executing program 7: r0 = socket$inet(0x2, 0x3, 0x7e) sendmmsg$inet(r0, &(0x7f0000000280)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x1, 0x0) [ 76.465301] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 76.468336] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 76.469863] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 76.473616] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 76.476165] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 76.477754] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 76.482942] Bluetooth: hci0: HCI_REQ-0x0c1a [ 76.595383] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 76.597807] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 76.600532] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 76.603757] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 76.607071] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 76.608736] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 76.610976] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 76.618932] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 76.620270] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 76.624275] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 76.627720] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 76.629604] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 76.632552] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 76.643879] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 76.646799] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 76.646866] Bluetooth: hci4: HCI_REQ-0x0c1a [ 76.650750] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 76.653015] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 76.653499] Bluetooth: hci3: HCI_REQ-0x0c1a [ 76.654514] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 76.670773] Bluetooth: hci2: HCI_REQ-0x0c1a [ 76.732164] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 76.734128] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 76.735509] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 76.742546] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 76.744402] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 76.745714] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 76.747414] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 76.748989] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 76.750888] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 76.756368] Bluetooth: hci1: HCI_REQ-0x0c1a [ 76.783101] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 76.783194] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 76.786533] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 76.788555] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 76.788633] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 76.790529] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 76.813921] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 76.815409] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 76.818627] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 76.833950] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 76.835543] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 76.837910] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 76.839172] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 76.841227] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 76.842571] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 76.848127] Bluetooth: hci5: HCI_REQ-0x0c1a [ 76.874118] Bluetooth: hci7: HCI_REQ-0x0c1a [ 76.881750] Bluetooth: hci6: HCI_REQ-0x0c1a [ 78.547193] Bluetooth: hci0: command 0x0409 tx timeout [ 78.674791] Bluetooth: hci2: command 0x0409 tx timeout [ 78.675339] Bluetooth: hci4: command 0x0409 tx timeout [ 78.675872] Bluetooth: hci3: command 0x0409 tx timeout [ 78.802678] Bluetooth: hci1: command 0x0409 tx timeout [ 78.866871] Bluetooth: hci5: command 0x0409 tx timeout [ 78.930834] Bluetooth: hci7: command 0x0409 tx timeout [ 78.932558] Bluetooth: hci6: command 0x0409 tx timeout [ 80.644341] Bluetooth: hci0: command 0x041b tx timeout [ 80.722794] Bluetooth: hci3: command 0x041b tx timeout [ 80.726595] Bluetooth: hci4: command 0x041b tx timeout [ 80.727541] Bluetooth: hci2: command 0x041b tx timeout [ 80.850724] Bluetooth: hci1: command 0x041b tx timeout [ 80.915752] Bluetooth: hci5: command 0x041b tx timeout [ 80.978747] Bluetooth: hci6: command 0x041b tx timeout [ 80.980806] Bluetooth: hci7: command 0x041b tx timeout [ 82.706784] Bluetooth: hci0: command 0x040f tx timeout [ 82.771923] Bluetooth: hci2: command 0x040f tx timeout [ 82.772430] Bluetooth: hci4: command 0x040f tx timeout [ 82.772894] Bluetooth: hci3: command 0x040f tx timeout [ 82.898793] Bluetooth: hci1: command 0x040f tx timeout [ 82.962686] Bluetooth: hci5: command 0x040f tx timeout [ 83.026739] Bluetooth: hci7: command 0x040f tx timeout [ 83.027296] Bluetooth: hci6: command 0x040f tx timeout [ 84.755737] Bluetooth: hci0: command 0x0419 tx timeout [ 84.819930] Bluetooth: hci3: command 0x0419 tx timeout [ 84.820377] Bluetooth: hci4: command 0x0419 tx timeout [ 84.820819] Bluetooth: hci2: command 0x0419 tx timeout [ 84.947703] Bluetooth: hci1: command 0x0419 tx timeout [ 85.010776] Bluetooth: hci5: command 0x0419 tx timeout [ 85.075741] Bluetooth: hci6: command 0x0419 tx timeout [ 85.076222] Bluetooth: hci7: command 0x0419 tx timeout 14:56:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000480)={@mcast1, @mcast1, @local, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1000110}) 14:56:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000480)={@mcast1, @mcast1, @local, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1000110}) 14:56:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000480)={@mcast1, @mcast1, @local, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1000110}) 14:56:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x4b72, &(0x7f0000000000)) [ 130.316328] audit: type=1400 audit(1663080963.540:7): avc: denied { open } for pid=3837 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 130.321633] audit: type=1400 audit(1663080963.540:8): avc: denied { kernel } for pid=3837 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 130.330228] ------------[ cut here ]------------ [ 130.330246] [ 130.330248] ====================================================== [ 130.330252] WARNING: possible circular locking dependency detected [ 130.330256] 6.0.0-rc5-next-20220913 #1 Not tainted [ 130.330262] ------------------------------------------------------ [ 130.330265] syz-executor.4/3838 is trying to acquire lock: [ 130.330271] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 130.330310] [ 130.330310] but task is already holding lock: [ 130.330313] ffff88800ebdc420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 130.330341] [ 130.330341] which lock already depends on the new lock. [ 130.330341] [ 130.330344] [ 130.330344] the existing dependency chain (in reverse order) is: [ 130.330347] [ 130.330347] -> #3 (&ctx->lock){....}-{2:2}: [ 130.330361] _raw_spin_lock+0x2a/0x40 [ 130.330379] __perf_event_task_sched_out+0x53b/0x18d0 [ 130.330391] __schedule+0xedd/0x2470 [ 130.330402] schedule+0xda/0x1b0 [ 130.330411] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.330435] syscall_exit_to_user_mode+0x19/0x40 [ 130.330459] do_syscall_64+0x48/0x90 [ 130.330473] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.330491] [ 130.330491] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 130.330504] _raw_spin_lock_nested+0x30/0x40 [ 130.330519] raw_spin_rq_lock_nested+0x1e/0x30 [ 130.330533] task_fork_fair+0x63/0x4d0 [ 130.330550] sched_cgroup_fork+0x3d0/0x540 [ 130.330564] copy_process+0x3f9e/0x6df0 [ 130.330575] kernel_clone+0xe7/0x890 [ 130.330584] user_mode_thread+0xad/0xf0 [ 130.330595] rest_init+0x24/0x250 [ 130.330611] arch_call_rest_init+0xf/0x14 [ 130.330632] start_kernel+0x4c1/0x4e6 [ 130.330649] secondary_startup_64_no_verify+0xe0/0xeb [ 130.330665] [ 130.330665] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 130.330679] _raw_spin_lock_irqsave+0x39/0x60 [ 130.330694] try_to_wake_up+0xab/0x1920 [ 130.330707] up+0x75/0xb0 [ 130.330719] __up_console_sem+0x6e/0x80 [ 130.330735] console_unlock+0x46a/0x590 [ 130.330751] vprintk_emit+0x1bd/0x560 [ 130.330768] vprintk+0x84/0xa0 [ 130.330785] _printk+0xba/0xf1 [ 130.330803] kauditd_hold_skb.cold+0x3f/0x4e [ 130.330818] kauditd_send_queue+0x233/0x290 [ 130.330833] kauditd_thread+0x5da/0x9a0 [ 130.330847] kthread+0x2ed/0x3a0 [ 130.330862] ret_from_fork+0x22/0x30 [ 130.330874] [ 130.330874] -> #0 ((console_sem).lock){....}-{2:2}: [ 130.330888] __lock_acquire+0x2a02/0x5e70 [ 130.330905] lock_acquire+0x1a2/0x530 [ 130.330921] _raw_spin_lock_irqsave+0x39/0x60 [ 130.330936] down_trylock+0xe/0x70 [ 130.330948] __down_trylock_console_sem+0x3b/0xd0 [ 130.330964] vprintk_emit+0x16b/0x560 [ 130.330981] vprintk+0x84/0xa0 [ 130.330997] _printk+0xba/0xf1 [ 130.331014] report_bug.cold+0x72/0xab [ 130.331026] handle_bug+0x3c/0x70 [ 130.331039] exc_invalid_op+0x14/0x50 [ 130.331052] asm_exc_invalid_op+0x16/0x20 [ 130.331068] group_sched_out.part.0+0x2c7/0x460 [ 130.331079] ctx_sched_out+0x8f1/0xc10 [ 130.331088] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.331100] __schedule+0xedd/0x2470 [ 130.331110] schedule+0xda/0x1b0 [ 130.331119] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.331138] syscall_exit_to_user_mode+0x19/0x40 [ 130.331156] do_syscall_64+0x48/0x90 [ 130.331175] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.331192] [ 130.331192] other info that might help us debug this: [ 130.331192] [ 130.331194] Chain exists of: [ 130.331194] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 130.331194] [ 130.331209] Possible unsafe locking scenario: [ 130.331209] [ 130.331212] CPU0 CPU1 [ 130.331214] ---- ---- [ 130.331216] lock(&ctx->lock); [ 130.331223] lock(&rq->__lock); [ 130.331229] lock(&ctx->lock); [ 130.331235] lock((console_sem).lock); [ 130.331241] [ 130.331241] *** DEADLOCK *** [ 130.331241] [ 130.331243] 2 locks held by syz-executor.4/3838: [ 130.331250] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 130.331275] #1: ffff88800ebdc420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 130.331303] [ 130.331303] stack backtrace: [ 130.331306] CPU: 0 PID: 3838 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220913 #1 [ 130.331318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 130.331327] Call Trace: [ 130.331330] [ 130.331334] dump_stack_lvl+0x8b/0xb3 [ 130.331349] check_noncircular+0x263/0x2e0 [ 130.331366] ? format_decode+0x26c/0xb50 [ 130.331381] ? print_circular_bug+0x450/0x450 [ 130.331399] ? enable_ptr_key_workfn+0x20/0x20 [ 130.331414] ? format_decode+0x26c/0xb50 [ 130.331429] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 130.331447] __lock_acquire+0x2a02/0x5e70 [ 130.331469] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 130.331492] lock_acquire+0x1a2/0x530 [ 130.331509] ? down_trylock+0xe/0x70 [ 130.331523] ? rcu_read_unlock+0x40/0x40 [ 130.331545] ? vprintk+0x84/0xa0 [ 130.331563] _raw_spin_lock_irqsave+0x39/0x60 [ 130.331578] ? down_trylock+0xe/0x70 [ 130.331592] down_trylock+0xe/0x70 [ 130.331605] ? vprintk+0x84/0xa0 [ 130.331623] __down_trylock_console_sem+0x3b/0xd0 [ 130.331640] vprintk_emit+0x16b/0x560 [ 130.331660] vprintk+0x84/0xa0 [ 130.331678] _printk+0xba/0xf1 [ 130.331695] ? record_print_text.cold+0x16/0x16 14:56:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x4b72, &(0x7f0000000000)) [ 130.331717] ? report_bug.cold+0x66/0xab [ 130.331732] ? group_sched_out.part.0+0x2c7/0x460 [ 130.331743] report_bug.cold+0x72/0xab [ 130.331758] handle_bug+0x3c/0x70 [ 130.331772] exc_invalid_op+0x14/0x50 [ 130.331786] asm_exc_invalid_op+0x16/0x20 [ 130.331804] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 130.331817] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 130.331828] RSP: 0018:ffff888041917c48 EFLAGS: 00010006 [ 130.331837] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 130.331845] RDX: ffff888017c3b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 130.331853] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 130.331860] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800ebdc400 [ 130.331868] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 130.331880] ? group_sched_out.part.0+0x2c7/0x460 [ 130.331893] ? group_sched_out.part.0+0x2c7/0x460 [ 130.331906] ctx_sched_out+0x8f1/0xc10 [ 130.331918] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.331933] ? lock_is_held_type+0xd7/0x130 [ 130.331952] ? __perf_cgroup_move+0x160/0x160 [ 130.331964] ? set_next_entity+0x304/0x550 [ 130.331982] ? update_curr+0x267/0x740 [ 130.332001] ? lock_is_held_type+0xd7/0x130 [ 130.332020] __schedule+0xedd/0x2470 [ 130.332033] ? io_schedule_timeout+0x150/0x150 [ 130.332047] schedule+0xda/0x1b0 [ 130.332058] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.332079] syscall_exit_to_user_mode+0x19/0x40 [ 130.332098] do_syscall_64+0x48/0x90 [ 130.332112] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.332130] RIP: 0033:0x7fd362939b19 [ 130.332138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.332149] RSP: 002b:00007fd35feaf218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 130.332160] RAX: 0000000000000001 RBX: 00007fd362a4cf68 RCX: 00007fd362939b19 [ 130.332168] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fd362a4cf6c [ 130.332175] RBP: 00007fd362a4cf60 R08: 000000000000000e R09: 0000000000000000 [ 130.332183] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fd362a4cf6c [ 130.332190] R13: 00007fff46c2567f R14: 00007fd35feaf300 R15: 0000000000022000 [ 130.332203] [ 130.388487] WARNING: CPU: 0 PID: 3838 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 130.389182] Modules linked in: [ 130.389433] CPU: 0 PID: 3838 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220913 #1 [ 130.390043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 130.390876] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 130.391291] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 130.392635] RSP: 0018:ffff888041917c48 EFLAGS: 00010006 [ 130.393032] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 130.393557] RDX: ffff888017c3b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 130.394086] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 130.394627] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88800ebdc400 [ 130.395180] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 130.395710] FS: 00007fd35feaf700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 130.396314] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 130.396761] CR2: 000055c7ce1f2b88 CR3: 0000000041022000 CR4: 0000000000350ef0 [ 130.397295] Call Trace: [ 130.397497] [ 130.397676] ctx_sched_out+0x8f1/0xc10 [ 130.397979] __perf_event_task_sched_out+0x6d0/0x18d0 [ 130.398375] ? lock_is_held_type+0xd7/0x130 [ 130.398717] ? __perf_cgroup_move+0x160/0x160 [ 130.399059] ? set_next_entity+0x304/0x550 [ 130.399392] ? update_curr+0x267/0x740 [ 130.399700] ? lock_is_held_type+0xd7/0x130 [ 130.400030] __schedule+0xedd/0x2470 [ 130.400319] ? io_schedule_timeout+0x150/0x150 [ 130.400335] schedule+0xda/0x1b0 [ 130.400346] exit_to_user_mode_prepare+0x114/0x1a0 [ 130.400373] syscall_exit_to_user_mode+0x19/0x40 [ 130.400392] do_syscall_64+0x48/0x90 [ 130.400408] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.400426] RIP: 0033:0x7fd362939b19 [ 130.400436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 130.400448] RSP: 002b:00007fd35feaf218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 130.400460] RAX: 0000000000000001 RBX: 00007fd362a4cf68 RCX: 00007fd362939b19 [ 130.400468] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fd362a4cf6c [ 130.400476] RBP: 00007fd362a4cf60 R08: 000000000000000e R09: 0000000000000000 [ 130.400483] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fd362a4cf6c [ 130.400491] R13: 00007fff46c2567f R14: 00007fd35feaf300 R15: 0000000000022000 [ 130.400504] [ 130.400508] irq event stamp: 980 [ 130.400512] hardirqs last enabled at (979): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 130.400537] hardirqs last disabled at (980): [] __schedule+0x1225/0x2470 [ 130.400551] softirqs last enabled at (974): [] __irq_exit_rcu+0x11b/0x180 [ 130.400573] softirqs last disabled at (633): [] __irq_exit_rcu+0x11b/0x180 [ 130.400593] ---[ end trace 0000000000000000 ]--- 14:56:03 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x4b72, &(0x7f0000000000)) 14:56:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x5, &(0x7f0000003bc0), 0x0) 14:56:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) [ 130.783342] syz-executor.1 (3870) used greatest stack depth: 24600 bytes left 14:56:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000d4f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000001000028020000028400001b", 0x65, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000010300)="02000000030000000400000032000f000300040000000000000000000f002f7c", 0x20, 0x1000}], 0x0, &(0x7f0000013800)) 14:56:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x5, &(0x7f0000003bc0), 0x0) 14:56:05 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r0, 0x4b72, &(0x7f0000000000)) 14:56:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 14:56:05 executing program 3: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc) 14:56:05 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 14:56:05 executing program 7: r0 = socket$inet(0x2, 0x3, 0x7e) sendmmsg$inet(r0, &(0x7f0000000280)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x1, 0x0) 14:56:05 executing program 2: prctl$PR_SET_MM_EXE_FILE(0x35, 0xd, 0xffffffffffffffff) [ 132.453156] loop0: detected capacity change from 0 to 512 14:56:05 executing program 3: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc) 14:56:05 executing program 7: r0 = socket$inet(0x2, 0x3, 0x7e) sendmmsg$inet(r0, &(0x7f0000000280)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x1, 0x0) 14:56:05 executing program 2: prctl$PR_SET_MM_EXE_FILE(0x35, 0xd, 0xffffffffffffffff) 14:56:05 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 14:56:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x5, &(0x7f0000003bc0), 0x0) [ 132.486773] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 132.491236] EXT4-fs (loop0): get root inode failed [ 132.492306] EXT4-fs (loop0): mount failed 14:56:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x8c, 0x1, 0x0, &(0x7f0000000380), 0x0) 14:56:05 executing program 3: semtimedop(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc) 14:56:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x81, 0xef, 0x7, 0x0, 0x6, 0x12, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8ee, 0x6aeae925f990a1d6, @perf_config_ext={0x3, 0x2}, 0x4110, 0xffff, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x101}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002180)={{}, {}, [], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x4}}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) fcntl$getown(0xffffffffffffffff, 0x9) 14:56:05 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 14:56:05 executing program 7: r0 = socket$inet(0x2, 0x3, 0x7e) sendmmsg$inet(r0, &(0x7f0000000280)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x1, 0x0) 14:56:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x8c, 0x1, 0x0, &(0x7f0000000380), 0x0) 14:56:05 executing program 2: prctl$PR_SET_MM_EXE_FILE(0x35, 0xd, 0xffffffffffffffff) 14:56:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000d4f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000001000028020000028400001b", 0x65, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000010300)="02000000030000000400000032000f000300040000000000000000000f002f7c", 0x20, 0x1000}], 0x0, &(0x7f0000013800)) 14:56:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x12, 0x0, 0x0) [ 132.698065] loop0: detected capacity change from 0 to 512 [ 132.726392] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 132.728795] EXT4-fs (loop0): get root inode failed [ 132.729480] EXT4-fs (loop0): mount failed 14:56:05 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x12, 0x0, 0x0) 14:56:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x8c, 0x1, 0x0, &(0x7f0000000380), 0x0) [ 132.885657] hrtimer: interrupt took 18014 ns [ 133.108009] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 133.244901] loop0: detected capacity change from 0 to 512 14:56:06 executing program 1: r0 = getpid() tgkill(r0, r0, 0x0) 14:56:06 executing program 7: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 14:56:06 executing program 3: perf_event_open(&(0x7f00000038c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_io_uring_setup(0x4c2a, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f000000a4c0)) 14:56:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000d4f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000001000028020000028400001b", 0x65, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000010300)="02000000030000000400000032000f000300040000000000000000000f002f7c", 0x20, 0x1000}], 0x0, &(0x7f0000013800)) 14:56:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x8c, 0x1, 0x0, &(0x7f0000000380), 0x0) 14:56:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x12, 0x0, 0x0) 14:56:06 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:06 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) [ 133.296192] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 133.298055] EXT4-fs (loop0): get root inode failed [ 133.298833] EXT4-fs (loop0): mount failed [ 133.372684] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 14:56:06 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:06 executing program 7: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 14:56:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x12, 0x0, 0x0) 14:56:06 executing program 5: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 14:56:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000d4f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000001000028020000028400001b", 0x65, 0x400}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200001", 0x21, 0x540}, {&(0x7f0000010300)="02000000030000000400000032000f000300040000000000000000000f002f7c", 0x20, 0x1000}], 0x0, &(0x7f0000013800)) [ 133.399124] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 133.426171] loop0: detected capacity change from 0 to 512 [ 133.442374] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 133.446082] EXT4-fs error (device loop0): __ext4_fill_super:5244: inode #2: comm syz-executor.0: iget: root inode unallocated [ 133.447474] EXT4-fs (loop0): get root inode failed [ 133.448004] EXT4-fs (loop0): mount failed 14:56:06 executing program 7: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 14:56:06 executing program 5: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 14:56:06 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:06 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) [ 133.575976] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 133.668188] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 14:56:06 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:06 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:06 executing program 7: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 14:56:06 executing program 3: perf_event_open(&(0x7f00000038c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_io_uring_setup(0x4c2a, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f000000a4c0)) 14:56:06 executing program 5: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 14:56:06 executing program 0: keyctl$negate(0xd, 0x0, 0x0, 0x0) 14:56:06 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:06 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) [ 133.767979] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 14:56:07 executing program 0: keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 133.783558] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 133.786301] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 14:56:07 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0xf, 0x0, &(0x7f00000000c0)) [ 133.809706] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 14:56:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @can, @rc={0x1f, @any, 0x89}, @in={0x2, 0x4e21, @private=0xa010101}, 0x2, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1, 0x81, 0x625a}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x48, 0x0, 0x0, 0x3}, {0x6}]}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 14:56:07 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:07 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:07 executing program 0: keyctl$negate(0xd, 0x0, 0x0, 0x0) 14:56:07 executing program 6: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 14:56:07 executing program 3: perf_event_open(&(0x7f00000038c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_io_uring_setup(0x4c2a, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f000000a4c0)) [ 133.915623] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 14:56:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @can, @rc={0x1f, @any, 0x89}, @in={0x2, 0x4e21, @private=0xa010101}, 0x2, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1, 0x81, 0x625a}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x48, 0x0, 0x0, 0x3}, {0x6}]}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 133.945342] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 133.995277] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 14:56:07 executing program 0: keyctl$negate(0xd, 0x0, 0x0, 0x0) 14:56:07 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0xf, 0x0, &(0x7f00000000c0)) 14:56:07 executing program 3: perf_event_open(&(0x7f00000038c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_io_uring_setup(0x4c2a, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f000000a4c0)) 14:56:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @can, @rc={0x1f, @any, 0x89}, @in={0x2, 0x4e21, @private=0xa010101}, 0x2, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1, 0x81, 0x625a}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x48, 0x0, 0x0, 0x3}, {0x6}]}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 14:56:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @can, @rc={0x1f, @any, 0x89}, @in={0x2, 0x4e21, @private=0xa010101}, 0x2, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1, 0x81, 0x625a}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x48, 0x0, 0x0, 0x3}, {0x6}]}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 14:56:07 executing program 1: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_opts(r0, 0x29, 0x3, 0x0, &(0x7f0000000080)=0xa) 14:56:07 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000040)={0x24, @short}, 0x14) 14:56:07 executing program 2: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000340)) 14:56:07 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0xf, 0x0, &(0x7f00000000c0)) 14:56:07 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @mss], 0x2000000000000145) 14:56:07 executing program 2: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000340)) 14:56:07 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000040)={0x24, @short}, 0x14) 14:56:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @can, @rc={0x1f, @any, 0x89}, @in={0x2, 0x4e21, @private=0xa010101}, 0x2, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1, 0x81, 0x625a}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x48, 0x0, 0x0, 0x3}, {0x6}]}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 14:56:07 executing program 1: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_opts(r0, 0x29, 0x3, 0x0, &(0x7f0000000080)=0xa) 14:56:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @can, @rc={0x1f, @any, 0x89}, @in={0x2, 0x4e21, @private=0xa010101}, 0x2, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1, 0x81, 0x625a}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x48, 0x0, 0x0, 0x3}, {0x6}]}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 14:56:07 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0xf, 0x0, &(0x7f00000000c0)) 14:56:07 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @mss], 0x2000000000000145) 14:56:07 executing program 2: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000340)) 14:56:07 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000040)={0x24, @short}, 0x14) 14:56:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @can, @rc={0x1f, @any, 0x89}, @in={0x2, 0x4e21, @private=0xa010101}, 0x2, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x1, 0x81, 0x625a}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000140)=0x100, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x48, 0x0, 0x0, 0x3}, {0x6}]}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 14:56:07 executing program 2: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000340)) 14:56:07 executing program 1: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_opts(r0, 0x29, 0x3, 0x0, &(0x7f0000000080)=0xa) 14:56:07 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @mss], 0x2000000000000145) 14:56:07 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000040)={0x24, @short}, 0x14) 14:56:07 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @mss], 0x2000000000000145) [ 134.416245] loop2: detected capacity change from 0 to 2048 14:56:07 executing program 1: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000005, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_opts(r0, 0x29, 0x3, 0x0, &(0x7f0000000080)=0xa) 14:56:07 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000040)={0x24, @short}, 0x14) 14:56:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x7}}) 14:56:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000016c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000940)=[@flowinfo={{0x14, 0x29, 0xb, 0x3ff}}, @flowinfo={{0x14}}], 0x30}}], 0x1, 0x0) 14:56:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x38, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_MODE={0xa}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x38}}, 0x0) 14:56:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33323134393739343100"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040000c00000000000000e0f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000e0f4655fe0f4655fe0f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000020000000", 0x40, 0x2400}, {&(0x7f0000011700)="20000000b45b976cb45b976c00000000e0f4655f00"/32, 0x20, 0x2480}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2800}, {&(0x7f0000011900)="20000000000000000000000000000000e0f4655f00"/32, 0x20, 0x2880}, {&(0x7f0000011a00)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000050000000", 0x40, 0x2c00}, {&(0x7f0000011b00)="20000000000000000000000000000000e0f4655f00"/32, 0x20, 0x2c80}, {&(0x7f0000011c00)="c041000000380000e0f4655fe0f4655fe0f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000030000000", 0x40, 0x4800}, {&(0x7f0000011d00)="20000000000000000000000000000000e0f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4880}, {&(0x7f0000011e00)="ed4100003c000000e0f4655fe0f4655fe0f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c65310000000000000000000000000000000000000000000000000000006b1710a600000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4c00}, {&(0x7f0000011f00)="ed8100001a040000e0f4655fe0f4655fe0f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000006f20934800000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x5000}, {&(0x7f0000012000)="ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3332313439373934312f66696c65302f66696c653000000000000000000000000000000000000000000000afa6093f00000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x5400}, {&(0x7f0000012100)="ed8100000a000000e0f4655fe0f4655fe0f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009270a1b300000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x5800}, {&(0x7f0000012200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000e0f4655fe0f4655fe0f4655f00000000000002004000000000000800010000000af301000400000000000000000000000500000070000000000000000000000000000000000000000000000000000000000000000000000000000000743fdfdf00000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xc0, 0x5be0}, {&(0x7f0000012300)="ed81000064000000e0f4655fe0f4655fe0f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c2efb56f000000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x63c0}, {&(0x7f0000012500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x18000}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x18800}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19800}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a000}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a800}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1b000}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x20400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x21400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x28000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x28400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x28800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x28c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x29000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x29400}, {&(0x7f0000013900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}], 0x0, &(0x7f0000013e00)) 14:56:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=@hopopts={0x89, 0x3, '\x00', [@hao={0xc9, 0x10, @mcast2}, @jumbo={0xc2, 0x4, 0x1}]}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$tcp_congestion(r3, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000d40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000d80)=ANY=[@ANYBLOB="8c000000040a010300000000000000000c000009280008800c00024000000000800000010c00024000000000000003720c000140000000000000001f0b00070066696c74657200000800054000000000080007006e6174000900010073797a300000000008000540fffffffd20000480080002401b301340140003006272696467655f736c6176655f30000061512b3ed960ee7fc4b58cbc38c4dc1ca85027526a507a283bc6a601e69ea1a8fedba63a0d51702d7310f4bb03f3b5c9af0a49b7a72d1e38fb4f5d2298ea4e09fc52ab2d"], 0x8c}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000004) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x3, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x80000000}, 0x1c) sendfile(r1, r1, 0x0, 0x100000) 14:56:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xb, &(0x7f0000000200)=0x5, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_DELSETELEM={0x14, 0xe, 0xa, 0x506}], {0x14}}, 0x3c}}, 0x0) [ 134.473976] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4174 comm=syz-executor.0 [ 134.475375] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4174 comm=syz-executor.0 [ 134.488957] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. 14:56:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x38, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_MODE={0xa}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x38}}, 0x0) 14:56:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000016c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000940)=[@flowinfo={{0x14, 0x29, 0xb, 0x3ff}}, @flowinfo={{0x14}}], 0x30}}], 0x1, 0x0) [ 134.494483] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4178 comm=syz-executor.0 [ 134.495443] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4178 comm=syz-executor.0 14:56:07 executing program 1: syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0x0, 0x0, 0x2019}}}, 0x7) 14:56:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x7}}) 14:56:07 executing program 7: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000040)={0x24, @short}, 0x14) [ 134.522553] EXT4-fs (loop2): unmounting filesystem. 14:56:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x38, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_MODE={0xa}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8}]}, 0x38}}, 0x0) 14:56:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33323134393739343100"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040000c00000000000000e0f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff VM DIAGNOSIS: 14:56:03 Registers: info registers vcpu 0 RAX=0000000040000002 RBX=00000000fffffffe RCX=ffffffff8410d052 RDX=ffff888017c3b580 RSI=0000000000000000 RDI=0000000000000000 RBP=0000000000000002 RSP=ffff8880419173b8 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000000000 R13=0000000000000003 R14=ffff8880c1917737 R15=ffff88804191773b RIP=ffffffff814613b4 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fd35feaf700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055c7ce1f2b88 CR3=0000000041022000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007fd362a207c0 00007fd362a207c8 YMM02=0000000000000000 0000000000000000 00007fd362a207e0 00007fd362a207c0 YMM03=0000000000000000 0000000000000000 00007fd362a207c8 00007fd362a207c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=ffffffff810ad6a4 RBX=ffffffff85b44ed8 RCX=ffffffff810ad6fe RDX=0000000000000000 RSI=ffffffff85e2d82a RDI=ffffffff85b44ec8 RBP=ffffffff85b44edc RSP=ffff8880410ff578 R8 =ffffffff85e2d82a R9 =ffffffff85e3b4f6 R10=ffffed100821fedf R11=000000000003603d R12=ffffffff85b44ed8 R13=ffffffff85b44ec8 R14=ffffffff85b44ed8 R15=dffffc0000000000 RIP=ffffffff8111ac55 RFL=00000297 [--S-APC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f001c7621f0 CR3=0000000040c2e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 756e696c2d34365f 3638782f62696c2f YMM01=0000000000000000 0000000000000000 322e6f732e6c6462 696c2f756e672d78 YMM02=0000000000000000 0000000000000000 00322e6f732e6c64 62696c2f756e672d YMM03=0000000000000000 0000000000000000 78756e696c2d3436 5f3638782f62696c YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000