Warning: Permanently added '[localhost]:48310' (ECDSA) to the list of known hosts. 2022/09/12 13:57:33 fuzzer started 2022/09/12 13:57:34 dialing manager at localhost:38027 syzkaller login: [ 41.199230] cgroup: Unknown subsys name 'net' [ 41.278603] cgroup: Unknown subsys name 'rlimit' 2022/09/12 13:57:47 syscalls: 2215 2022/09/12 13:57:47 code coverage: enabled 2022/09/12 13:57:47 comparison tracing: enabled 2022/09/12 13:57:47 extra coverage: enabled 2022/09/12 13:57:47 setuid sandbox: enabled 2022/09/12 13:57:47 namespace sandbox: enabled 2022/09/12 13:57:47 Android sandbox: enabled 2022/09/12 13:57:47 fault injection: enabled 2022/09/12 13:57:47 leak checking: enabled 2022/09/12 13:57:47 net packet injection: enabled 2022/09/12 13:57:47 net device setup: enabled 2022/09/12 13:57:47 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/12 13:57:47 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/12 13:57:47 USB emulation: enabled 2022/09/12 13:57:47 hci packet injection: enabled 2022/09/12 13:57:47 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220912) 2022/09/12 13:57:47 802.15.4 emulation: enabled 2022/09/12 13:57:47 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/12 13:57:47 fetching corpus: 50, signal 30570/33778 (executing program) 2022/09/12 13:57:48 fetching corpus: 100, signal 41665/46070 (executing program) 2022/09/12 13:57:48 fetching corpus: 150, signal 54670/59889 (executing program) 2022/09/12 13:57:48 fetching corpus: 200, signal 62631/68685 (executing program) 2022/09/12 13:57:48 fetching corpus: 250, signal 69929/76718 (executing program) 2022/09/12 13:57:48 fetching corpus: 300, signal 74360/81954 (executing program) 2022/09/12 13:57:48 fetching corpus: 350, signal 78257/86630 (executing program) 2022/09/12 13:57:49 fetching corpus: 400, signal 82484/91488 (executing program) 2022/09/12 13:57:49 fetching corpus: 450, signal 85737/95346 (executing program) 2022/09/12 13:57:49 fetching corpus: 500, signal 90565/100511 (executing program) 2022/09/12 13:57:49 fetching corpus: 550, signal 93568/103958 (executing program) 2022/09/12 13:57:49 fetching corpus: 600, signal 98891/109255 (executing program) 2022/09/12 13:57:49 fetching corpus: 650, signal 101597/112305 (executing program) 2022/09/12 13:57:50 fetching corpus: 700, signal 103719/114732 (executing program) 2022/09/12 13:57:50 fetching corpus: 750, signal 106256/117545 (executing program) 2022/09/12 13:57:50 fetching corpus: 800, signal 109143/120538 (executing program) 2022/09/12 13:57:50 fetching corpus: 850, signal 111464/123117 (executing program) 2022/09/12 13:57:50 fetching corpus: 900, signal 114439/126078 (executing program) 2022/09/12 13:57:50 fetching corpus: 950, signal 117786/129174 (executing program) 2022/09/12 13:57:51 fetching corpus: 1000, signal 119212/130784 (executing program) 2022/09/12 13:57:51 fetching corpus: 1050, signal 121279/132810 (executing program) 2022/09/12 13:57:51 fetching corpus: 1100, signal 122823/134455 (executing program) 2022/09/12 13:57:51 fetching corpus: 1150, signal 125062/136562 (executing program) 2022/09/12 13:57:51 fetching corpus: 1200, signal 127800/138941 (executing program) 2022/09/12 13:57:51 fetching corpus: 1250, signal 129934/140842 (executing program) 2022/09/12 13:57:52 fetching corpus: 1300, signal 130982/141964 (executing program) 2022/09/12 13:57:52 fetching corpus: 1350, signal 132917/143647 (executing program) 2022/09/12 13:57:52 fetching corpus: 1400, signal 135675/145824 (executing program) 2022/09/12 13:57:52 fetching corpus: 1450, signal 137420/147295 (executing program) 2022/09/12 13:57:52 fetching corpus: 1500, signal 139778/149150 (executing program) 2022/09/12 13:57:52 fetching corpus: 1550, signal 142592/151182 (executing program) 2022/09/12 13:57:53 fetching corpus: 1600, signal 143986/152262 (executing program) 2022/09/12 13:57:53 fetching corpus: 1650, signal 145391/153324 (executing program) 2022/09/12 13:57:53 fetching corpus: 1700, signal 146754/154316 (executing program) 2022/09/12 13:57:53 fetching corpus: 1750, signal 148627/155586 (executing program) 2022/09/12 13:57:53 fetching corpus: 1800, signal 150125/156637 (executing program) 2022/09/12 13:57:53 fetching corpus: 1850, signal 151672/157675 (executing program) 2022/09/12 13:57:54 fetching corpus: 1900, signal 153402/159003 (executing program) 2022/09/12 13:57:54 fetching corpus: 1950, signal 155103/160148 (executing program) 2022/09/12 13:57:54 fetching corpus: 2000, signal 155977/160823 (executing program) 2022/09/12 13:57:54 fetching corpus: 2050, signal 156757/161363 (executing program) 2022/09/12 13:57:54 fetching corpus: 2100, signal 157935/162069 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/162466 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/162541 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/162621 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/162701 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/162781 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/162872 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/162971 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163067 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163147 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163229 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163318 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163402 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163497 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163579 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163666 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163751 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163840 (executing program) 2022/09/12 13:57:54 fetching corpus: 2142, signal 158625/163935 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164019 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164114 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164215 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164285 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164383 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164474 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164568 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164646 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164754 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164843 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/164933 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165042 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165111 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165194 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165280 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165377 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165461 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165556 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165634 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165683 (executing program) 2022/09/12 13:57:55 fetching corpus: 2142, signal 158625/165683 (executing program) 2022/09/12 13:57:57 starting 8 fuzzer processes 13:57:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:57:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000028305c8a835f4f4da440baa59e2884cb010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}], 0x2000c01, &(0x7f0000005080)=ANY=[]) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 64.724298] audit: type=1400 audit(1662991077.685:6): avc: denied { execmem } for pid=285 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 13:57:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 13:57:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="01b6ce00004f25c784000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000300)={0x0, 0x82e8, 0x8, 0x2}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r0, 0x0, 0xfffffff1) 13:57:57 executing program 4: shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) r0 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x7000) shmat(r1, &(0x7f0000ff9000/0x1000)=nil, 0x2000) r2 = shmget(0x3, 0x3000, 0x78000000, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x5000) openat$sr(0xffffffffffffff9c, 0x0, 0x40b01, 0x0) ioctl$CDROMREADTOCENTRY(0xffffffffffffffff, 0x5306, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xa83}, 0x2308, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0xa) write(0xffffffffffffffff, &(0x7f0000000140)="90e45c77a9262d19f24754389003c4245182f02ed7b392eea7e6642dc86a48c82f48c3b5f57a71c67a24a860032faaa9c1a92efba1da04d3efa692b2f8de9e89faaea7cbab8f359508a195b5c263d0154f018fa87cced403ef966c7645cfff63", 0x60) 13:57:57 executing program 5: clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40087602, 0x0) 13:57:57 executing program 6: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:57:57 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x28, 0x11, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x3, 0x0, 0x0, @u32}]}, 0x28}], 0x1}, 0x0) [ 66.065995] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 66.067894] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 66.069695] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 66.071376] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 66.074604] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 66.075827] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 66.077767] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 66.079553] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 66.086408] Bluetooth: hci0: HCI_REQ-0x0c1a [ 66.136919] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 66.152036] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 66.155889] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 66.157553] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 66.162275] Bluetooth: hci1: HCI_REQ-0x0c1a [ 66.193283] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 66.195246] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 66.196765] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 66.217896] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 66.217974] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 66.219840] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 66.221635] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 66.223305] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 66.223837] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 66.225751] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 66.227748] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 66.230353] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 66.232211] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 66.233345] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 66.235354] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 66.236622] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 66.237813] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 66.238925] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 66.241202] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 66.245062] Bluetooth: hci6: HCI_REQ-0x0c1a [ 66.246041] Bluetooth: hci4: HCI_REQ-0x0c1a [ 66.246158] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 66.248181] Bluetooth: hci7: HCI_REQ-0x0c1a [ 66.261981] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 66.264705] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 66.266414] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 66.267880] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 66.274175] Bluetooth: hci3: HCI_REQ-0x0c1a [ 66.283107] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 66.284805] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 66.310646] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 66.319345] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 66.320358] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 66.321699] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 66.329375] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 66.332136] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 66.339825] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 66.343748] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 66.344811] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 66.346959] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 66.367554] Bluetooth: hci2: HCI_REQ-0x0c1a [ 66.368267] Bluetooth: hci5: HCI_REQ-0x0c1a [ 68.137781] Bluetooth: hci0: command 0x0409 tx timeout [ 68.200566] Bluetooth: hci1: command 0x0409 tx timeout [ 68.264538] Bluetooth: hci7: command 0x0409 tx timeout [ 68.266216] Bluetooth: hci4: command 0x0409 tx timeout [ 68.328516] Bluetooth: hci6: command 0x0409 tx timeout [ 68.329284] Bluetooth: hci3: command 0x0409 tx timeout [ 68.392626] Bluetooth: hci5: command 0x0409 tx timeout [ 68.393250] Bluetooth: hci2: command 0x0409 tx timeout [ 70.184507] Bluetooth: hci0: command 0x041b tx timeout [ 70.248743] Bluetooth: hci1: command 0x041b tx timeout [ 70.312566] Bluetooth: hci4: command 0x041b tx timeout [ 70.314211] Bluetooth: hci7: command 0x041b tx timeout [ 70.376541] Bluetooth: hci3: command 0x041b tx timeout [ 70.377652] Bluetooth: hci6: command 0x041b tx timeout [ 70.440702] Bluetooth: hci2: command 0x041b tx timeout [ 70.442281] Bluetooth: hci5: command 0x041b tx timeout [ 72.233474] Bluetooth: hci0: command 0x040f tx timeout [ 72.296482] Bluetooth: hci1: command 0x040f tx timeout [ 72.361582] Bluetooth: hci7: command 0x040f tx timeout [ 72.362038] Bluetooth: hci4: command 0x040f tx timeout [ 72.424491] Bluetooth: hci6: command 0x040f tx timeout [ 72.424956] Bluetooth: hci3: command 0x040f tx timeout [ 72.489486] Bluetooth: hci5: command 0x040f tx timeout [ 72.490119] Bluetooth: hci2: command 0x040f tx timeout [ 74.280519] Bluetooth: hci0: command 0x0419 tx timeout [ 74.345701] Bluetooth: hci1: command 0x0419 tx timeout [ 74.409515] Bluetooth: hci4: command 0x0419 tx timeout [ 74.410217] Bluetooth: hci7: command 0x0419 tx timeout [ 74.473583] Bluetooth: hci3: command 0x0419 tx timeout [ 74.475665] Bluetooth: hci6: command 0x0419 tx timeout [ 74.537564] Bluetooth: hci2: command 0x0419 tx timeout [ 74.540941] Bluetooth: hci5: command 0x0419 tx timeout [ 119.511503] audit: type=1400 audit(1662991132.472:7): avc: denied { watch_reads } for pid=3820 comm="syz-executor.2" path="/syzkaller-testdir851692486/syzkaller.MqHt0Z/0/file0" dev="devtmpfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=dir permissive=1 13:58:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 13:58:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 13:58:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 13:58:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) [ 120.981130] loop1: detected capacity change from 0 to 4096 13:58:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) [ 121.049266] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 121.094396] EXT4-fs (loop1): unmounting filesystem. [ 121.119978] audit: type=1400 audit(1662991134.081:8): avc: denied { open } for pid=3914 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 13:58:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000028305c8a835f4f4da440baa59e2884cb010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}], 0x2000c01, &(0x7f0000005080)=ANY=[]) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 121.122793] audit: type=1400 audit(1662991134.081:9): avc: denied { kernel } for pid=3914 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 121.140358] ------------[ cut here ]------------ [ 121.140382] [ 121.140386] ====================================================== [ 121.140390] WARNING: possible circular locking dependency detected [ 121.140395] 6.0.0-rc5-next-20220912 #1 Not tainted [ 121.140401] ------------------------------------------------------ [ 121.140405] syz-executor.4/3916 is trying to acquire lock: [ 121.140412] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 121.140454] [ 121.140454] but task is already holding lock: [ 121.140456] ffff88803e1e9c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 121.140484] [ 121.140484] which lock already depends on the new lock. [ 121.140484] [ 121.140488] [ 121.140488] the existing dependency chain (in reverse order) is: [ 121.140491] [ 121.140491] -> #3 (&ctx->lock){....}-{2:2}: [ 121.140505] _raw_spin_lock+0x2a/0x40 [ 121.140522] __perf_event_task_sched_out+0x53b/0x18d0 [ 121.140534] __schedule+0xedd/0x2470 [ 121.140544] schedule+0xda/0x1b0 [ 121.140553] exit_to_user_mode_prepare+0x114/0x1a0 [ 121.140574] syscall_exit_to_user_mode+0x19/0x40 [ 121.140592] do_syscall_64+0x48/0x90 [ 121.140605] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 121.140623] [ 121.140623] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 121.140637] _raw_spin_lock_nested+0x30/0x40 [ 121.140651] raw_spin_rq_lock_nested+0x1e/0x30 [ 121.140665] task_fork_fair+0x63/0x4d0 [ 121.140682] sched_cgroup_fork+0x3d0/0x540 [ 121.140697] copy_process+0x3f9e/0x6df0 [ 121.140707] kernel_clone+0xe7/0x890 [ 121.140717] user_mode_thread+0xad/0xf0 [ 121.140727] rest_init+0x24/0x250 [ 121.140743] arch_call_rest_init+0xf/0x14 [ 121.140763] start_kernel+0x4c1/0x4e6 [ 121.140780] secondary_startup_64_no_verify+0xe0/0xeb [ 121.140795] [ 121.140795] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 121.140808] _raw_spin_lock_irqsave+0x39/0x60 [ 121.140823] try_to_wake_up+0xab/0x1920 [ 121.140837] up+0x75/0xb0 [ 121.140848] __up_console_sem+0x6e/0x80 [ 121.140865] console_unlock+0x46a/0x590 [ 121.140881] vprintk_emit+0x1bd/0x560 [ 121.140898] vprintk+0x84/0xa0 [ 121.140914] _printk+0xba/0xf1 [ 121.140932] kauditd_hold_skb.cold+0x3f/0x4e [ 121.140946] kauditd_send_queue+0x233/0x290 [ 121.140961] kauditd_thread+0x5da/0x9a0 [ 121.140975] kthread+0x2ed/0x3a0 [ 121.140990] ret_from_fork+0x22/0x30 [ 121.141003] [ 121.141003] -> #0 ((console_sem).lock){....}-{2:2}: [ 121.141016] __lock_acquire+0x2a02/0x5e70 [ 121.141033] lock_acquire+0x1a2/0x530 [ 121.141049] _raw_spin_lock_irqsave+0x39/0x60 [ 121.141064] down_trylock+0xe/0x70 [ 121.141076] __down_trylock_console_sem+0x3b/0xd0 [ 121.141093] vprintk_emit+0x16b/0x560 [ 121.141109] vprintk+0x84/0xa0 [ 121.141126] _printk+0xba/0xf1 [ 121.141142] report_bug.cold+0x72/0xab [ 121.141154] handle_bug+0x3c/0x70 [ 121.141167] exc_invalid_op+0x14/0x50 [ 121.141180] asm_exc_invalid_op+0x16/0x20 [ 121.141196] group_sched_out.part.0+0x2c7/0x460 [ 121.141207] ctx_sched_out+0x8f1/0xc10 [ 121.141216] __perf_event_task_sched_out+0x6d0/0x18d0 [ 121.141228] __schedule+0xedd/0x2470 [ 121.141238] schedule+0xda/0x1b0 [ 121.141247] exit_to_user_mode_prepare+0x114/0x1a0 [ 121.141266] syscall_exit_to_user_mode+0x19/0x40 [ 121.141283] do_syscall_64+0x48/0x90 [ 121.141296] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 121.141312] [ 121.141312] other info that might help us debug this: [ 121.141312] [ 121.141315] Chain exists of: [ 121.141315] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 121.141315] [ 121.141330] Possible unsafe locking scenario: [ 121.141330] [ 121.141333] CPU0 CPU1 [ 121.141335] ---- ---- [ 121.141337] lock(&ctx->lock); [ 121.141343] lock(&rq->__lock); [ 121.141350] lock(&ctx->lock); [ 121.141356] lock((console_sem).lock); [ 121.141361] [ 121.141361] *** DEADLOCK *** [ 121.141361] [ 121.141363] 2 locks held by syz-executor.4/3916: [ 121.141371] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 121.141396] #1: ffff88803e1e9c20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 121.141424] [ 121.141424] stack backtrace: [ 121.141426] CPU: 0 PID: 3916 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220912 #1 [ 121.141439] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 121.141448] Call Trace: [ 121.141451] [ 121.141455] dump_stack_lvl+0x8b/0xb3 [ 121.141470] check_noncircular+0x263/0x2e0 [ 121.141487] ? format_decode+0x26c/0xb50 [ 121.141502] ? print_circular_bug+0x450/0x450 [ 121.141519] ? enable_ptr_key_workfn+0x20/0x20 [ 121.141534] ? format_decode+0x26c/0xb50 [ 121.141549] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 121.141567] __lock_acquire+0x2a02/0x5e70 [ 121.141589] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 121.141612] lock_acquire+0x1a2/0x530 [ 121.141629] ? down_trylock+0xe/0x70 [ 121.141644] ? rcu_read_unlock+0x40/0x40 [ 121.141665] ? vprintk+0x84/0xa0 [ 121.141684] _raw_spin_lock_irqsave+0x39/0x60 [ 121.141699] ? down_trylock+0xe/0x70 [ 121.141713] down_trylock+0xe/0x70 [ 121.141726] ? vprintk+0x84/0xa0 [ 121.141744] __down_trylock_console_sem+0x3b/0xd0 [ 121.141761] vprintk_emit+0x16b/0x560 [ 121.141781] vprintk+0x84/0xa0 [ 121.141799] _printk+0xba/0xf1 [ 121.141816] ? record_print_text.cold+0x16/0x16 [ 121.141838] ? report_bug.cold+0x66/0xab [ 121.141852] ? group_sched_out.part.0+0x2c7/0x460 [ 121.141864] report_bug.cold+0x72/0xab [ 121.141878] handle_bug+0x3c/0x70 [ 121.141892] exc_invalid_op+0x14/0x50 [ 121.141906] asm_exc_invalid_op+0x16/0x20 [ 121.141923] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 121.141937] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 121.141949] RSP: 0018:ffff88803e77fc48 EFLAGS: 00010006 [ 121.141958] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 121.141966] RDX: ffff88801d498000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 121.141973] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 121.141981] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88803e1e9c00 [ 121.141989] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 121.142000] ? group_sched_out.part.0+0x2c7/0x460 [ 121.142013] ? group_sched_out.part.0+0x2c7/0x460 [ 121.142026] ctx_sched_out+0x8f1/0xc10 [ 121.142038] __perf_event_task_sched_out+0x6d0/0x18d0 [ 121.142054] ? lock_is_held_type+0xd7/0x130 [ 121.142072] ? __perf_cgroup_move+0x160/0x160 [ 121.142084] ? set_next_entity+0x304/0x550 [ 121.142102] ? update_curr+0x267/0x740 [ 121.142121] ? lock_is_held_type+0xd7/0x130 [ 121.142140] __schedule+0xedd/0x2470 [ 121.142152] ? io_schedule_timeout+0x150/0x150 [ 121.142165] ? rcu_read_lock_sched_held+0x3e/0x80 [ 121.142186] schedule+0xda/0x1b0 [ 121.142196] exit_to_user_mode_prepare+0x114/0x1a0 [ 121.142217] syscall_exit_to_user_mode+0x19/0x40 [ 121.142235] do_syscall_64+0x48/0x90 [ 121.142249] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 121.142266] RIP: 0033:0x7f551ccc8b19 [ 121.142275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.142286] RSP: 002b:00007f551a23e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 121.142297] RAX: 0000000000000001 RBX: 00007f551cddbf68 RCX: 00007f551ccc8b19 [ 121.142305] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f551cddbf6c [ 121.142312] RBP: 00007f551cddbf60 R08: 000000000000000e R09: 0000000000000000 [ 121.142319] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f551cddbf6c [ 121.142327] R13: 00007fff9d8efdff R14: 00007f551a23e300 R15: 0000000000022000 [ 121.142340] [ 121.199837] WARNING: CPU: 0 PID: 3916 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 121.200533] Modules linked in: [ 121.200784] CPU: 0 PID: 3916 Comm: syz-executor.4 Not tainted 6.0.0-rc5-next-20220912 #1 [ 121.201391] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 121.202237] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 121.202657] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 121.204019] RSP: 0018:ffff88803e77fc48 EFLAGS: 00010006 [ 121.204422] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 121.204959] RDX: ffff88801d498000 RSI: ffffffff81566027 RDI: 0000000000000005 [ 121.205502] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 121.206058] R10: 0000000000000000 R11: ffffffff865aa01b R12: ffff88803e1e9c00 [ 121.206594] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 121.207140] FS: 00007f551a23e700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 121.207751] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 121.208189] CR2: 00007f28e2097368 CR3: 00000000187cc000 CR4: 0000000000350ef0 [ 121.208726] Call Trace: [ 121.208925] [ 121.209104] ctx_sched_out+0x8f1/0xc10 [ 121.209406] __perf_event_task_sched_out+0x6d0/0x18d0 [ 121.209802] ? lock_is_held_type+0xd7/0x130 [ 121.210139] ? __perf_cgroup_move+0x160/0x160 [ 121.210487] ? set_next_entity+0x304/0x550 [ 121.210819] ? update_curr+0x267/0x740 [ 121.211129] ? lock_is_held_type+0xd7/0x130 [ 121.211469] __schedule+0xedd/0x2470 [ 121.211764] ? io_schedule_timeout+0x150/0x150 [ 121.212114] ? rcu_read_lock_sched_held+0x3e/0x80 [ 121.212492] schedule+0xda/0x1b0 [ 121.212765] exit_to_user_mode_prepare+0x114/0x1a0 [ 121.213148] syscall_exit_to_user_mode+0x19/0x40 [ 121.213518] do_syscall_64+0x48/0x90 [ 121.213814] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 121.214215] RIP: 0033:0x7f551ccc8b19 [ 121.214505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 121.215870] RSP: 002b:00007f551a23e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 121.216442] RAX: 0000000000000001 RBX: 00007f551cddbf68 RCX: 00007f551ccc8b19 [ 121.216977] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f551cddbf6c [ 121.217518] RBP: 00007f551cddbf60 R08: 000000000000000e R09: 0000000000000000 [ 121.218049] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f551cddbf6c [ 121.218584] R13: 00007fff9d8efdff R14: 00007f551a23e300 R15: 0000000000022000 [ 121.219126] [ 121.219311] irq event stamp: 1862 [ 121.219594] hardirqs last enabled at (1861): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 121.220310] hardirqs last disabled at (1862): [] __schedule+0x1225/0x2470 [ 121.220937] softirqs last enabled at (1286): [] __irq_exit_rcu+0x11b/0x180 [ 121.221576] softirqs last disabled at (1277): [] __irq_exit_rcu+0x11b/0x180 [ 121.222219] ---[ end trace 0000000000000000 ]--- [ 121.284380] loop1: detected capacity change from 0 to 4096 13:58:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) [ 121.319957] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 121.357445] hrtimer: interrupt took 18885 ns 13:58:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000028305c8a835f4f4da440baa59e2884cb010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}], 0x2000c01, &(0x7f0000005080)=ANY=[]) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 121.474858] EXT4-fs (loop1): unmounting filesystem. [ 121.501681] random: crng reseeded on system resumption [ 121.561545] loop1: detected capacity change from 0 to 4096 [ 121.570095] loop3: detected capacity change from 0 to 40 [ 121.575544] FAT-fs (loop3): bogus number of reserved sectors [ 121.576015] FAT-fs (loop3): Can't find a valid FAT filesystem [ 121.579579] random: crng reseeded on system resumption [ 121.589246] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 121.593278] loop3: detected capacity change from 0 to 40 [ 121.594105] FAT-fs (loop3): Unrecognized mount option "./file0" or missing value [ 121.680832] EXT4-fs (loop1): unmounting filesystem. [ 122.005510] EXT4-fs warning (device sda): __ext4_ioctl:1238: Setting inode version is not supported with metadata_csum enabled. 13:58:54 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 13:58:54 executing program 5: clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40087602, 0x0) 13:58:54 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x28, 0x11, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x3, 0x0, 0x0, @u32}]}, 0x28}], 0x1}, 0x0) 13:58:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="01b6ce00004f25c784000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000300)={0x0, 0x82e8, 0x8, 0x2}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r0, 0x0, 0xfffffff1) 13:58:54 executing program 6: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 122.042781] loop1: detected capacity change from 0 to 4096 13:58:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000028305c8a835f4f4da440baa59e2884cb010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}], 0x2000c01, &(0x7f0000005080)=ANY=[]) mount(0x0, 0x0, 0x0, 0x0, 0x0) 13:58:54 executing program 4: shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) r0 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x7000) shmat(r1, &(0x7f0000ff9000/0x1000)=nil, 0x2000) r2 = shmget(0x3, 0x3000, 0x78000000, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x5000) openat$sr(0xffffffffffffff9c, 0x0, 0x40b01, 0x0) ioctl$CDROMREADTOCENTRY(0xffffffffffffffff, 0x5306, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xa83}, 0x2308, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0xa) write(0xffffffffffffffff, &(0x7f0000000140)="90e45c77a9262d19f24754389003c4245182f02ed7b392eea7e6642dc86a48c82f48c3b5f57a71c67a24a860032faaa9c1a92efba1da04d3efa692b2f8de9e89faaea7cbab8f359508a195b5c263d0154f018fa87cced403ef966c7645cfff63", 0x60) [ 122.046896] loop3: detected capacity change from 0 to 40 [ 122.050473] FAT-fs (loop3): bogus number of reserved sectors [ 122.050968] FAT-fs (loop3): Can't find a valid FAT filesystem [ 122.054882] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 122.083362] EXT4-fs warning (device sda): __ext4_ioctl:1238: Setting inode version is not supported with metadata_csum enabled. 13:58:55 executing program 5: clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40087602, 0x0) 13:58:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="01b6ce00004f25c784000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000300)={0x0, 0x82e8, 0x8, 0x2}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r0, 0x0, 0xfffffff1) [ 122.145783] loop3: detected capacity change from 0 to 40 [ 122.147535] EXT4-fs (loop1): unmounting filesystem. [ 122.152533] random: crng reseeded on system resumption [ 122.159094] FAT-fs (loop3): bogus number of reserved sectors [ 122.159565] FAT-fs (loop3): Can't find a valid FAT filesystem [ 122.175671] EXT4-fs warning (device sda): __ext4_ioctl:1238: Setting inode version is not supported with metadata_csum enabled. [ 122.260546] EXT4-fs warning (device sda): __ext4_ioctl:1238: Setting inode version is not supported with metadata_csum enabled. [ 122.280599] loop3: detected capacity change from 0 to 40 [ 122.285488] FAT-fs (loop3): bogus number of reserved sectors [ 122.285928] FAT-fs (loop3): Can't find a valid FAT filesystem 13:58:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) 13:58:55 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x28, 0x11, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x3, 0x0, 0x0, @u32}]}, 0x28}], 0x1}, 0x0) 13:58:55 executing program 5: clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40087602, 0x0) 13:58:55 executing program 6: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:58:55 executing program 4: shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) r0 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x7000) shmat(r1, &(0x7f0000ff9000/0x1000)=nil, 0x2000) r2 = shmget(0x3, 0x3000, 0x78000000, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x5000) openat$sr(0xffffffffffffff9c, 0x0, 0x40b01, 0x0) ioctl$CDROMREADTOCENTRY(0xffffffffffffffff, 0x5306, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xa83}, 0x2308, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0xa) write(0xffffffffffffffff, &(0x7f0000000140)="90e45c77a9262d19f24754389003c4245182f02ed7b392eea7e6642dc86a48c82f48c3b5f57a71c67a24a860032faaa9c1a92efba1da04d3efa692b2f8de9e89faaea7cbab8f359508a195b5c263d0154f018fa87cced403ef966c7645cfff63", 0x60) 13:58:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00", 0xc}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="01b6ce00004f25c784000000", @ANYRES32, @ANYBLOB="00000000000000005e4d57d9cf66696c"]) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000180)=']{\x00', 0x0, r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r4 = io_uring_setup(0x454c, &(0x7f0000000300)={0x0, 0x82e8, 0x8, 0x2}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r0, 0x0, 0xfffffff1) 13:58:55 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x28, 0x11, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0x8, 0x0, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x3, 0x0, 0x0, @u32}]}, 0x28}], 0x1}, 0x0) 13:58:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xa0000923) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) [ 122.356299] random: crng reseeded on system resumption 13:58:55 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:55 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) [ 122.402525] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 13:58:55 executing program 7: clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40087602, 0x0) 13:58:55 executing program 4: shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) r0 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x7000) shmat(r1, &(0x7f0000ff9000/0x1000)=nil, 0x2000) r2 = shmget(0x3, 0x3000, 0x78000000, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x5000) openat$sr(0xffffffffffffff9c, 0x0, 0x40b01, 0x0) ioctl$CDROMREADTOCENTRY(0xffffffffffffffff, 0x5306, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xa83}, 0x2308, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0xa) write(0xffffffffffffffff, &(0x7f0000000140)="90e45c77a9262d19f24754389003c4245182f02ed7b392eea7e6642dc86a48c82f48c3b5f57a71c67a24a860032faaa9c1a92efba1da04d3efa692b2f8de9e89faaea7cbab8f359508a195b5c263d0154f018fa87cced403ef966c7645cfff63", 0x60) 13:58:55 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:55 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:55 executing program 6: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:58:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:55 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:55 executing program 3: shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) r0 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x7000) shmat(r1, &(0x7f0000ff9000/0x1000)=nil, 0x2000) r2 = shmget(0x3, 0x3000, 0x78000000, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x5000) openat$sr(0xffffffffffffff9c, 0x0, 0x40b01, 0x0) ioctl$CDROMREADTOCENTRY(0xffffffffffffffff, 0x5306, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xa83}, 0x2308, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0xa) write(0xffffffffffffffff, &(0x7f0000000140)="90e45c77a9262d19f24754389003c4245182f02ed7b392eea7e6642dc86a48c82f48c3b5f57a71c67a24a860032faaa9c1a92efba1da04d3efa692b2f8de9e89faaea7cbab8f359508a195b5c263d0154f018fa87cced403ef966c7645cfff63", 0x60) [ 122.696603] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 122.701872] EXT4-fs warning (device sda): __ext4_ioctl:1238: Setting inode version is not supported with metadata_csum enabled. 13:58:55 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:55 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:55 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:58:55 executing program 7: clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40087602, 0x0) [ 122.814731] random: crng reseeded on system resumption 13:58:55 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 122.881420] random: crng reseeded on system resumption [ 122.895858] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 122.898382] EXT4-fs warning (device sda): __ext4_ioctl:1238: Setting inode version is not supported with metadata_csum enabled. 13:58:56 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="00000000d00b00002e2f66696c653100"]) r2 = io_uring_setup(0x5766, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r2, 0x4, 0x0, 0xfffffeed) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) fallocate(0xffffffffffffffff, 0x4, 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="fa1921df803613008b6abca5f40a7f3e8c2a2d648201809b9821a3b8f385b5b7a8bd542b9e1c45f8e3e56b41bb0ee9d59ecd7332c2d2c464c474cc3a6c8d822905a68c5ca4999044e6e056f0dc4ad5c23c1f", 0x52}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e13be9e0100af994fa2f6ae43a22eaf40415d54db9b61b57182d09d0b1e5bb2cc73eccd5c0", 0x36}, {0x0}], 0x3, 0x8001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x195300, 0x21) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, 0x0, 0x100000) 13:58:56 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:58:56 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), r0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 13:58:56 executing program 3: shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) r0 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x7000) shmat(r1, &(0x7f0000ff9000/0x1000)=nil, 0x2000) r2 = shmget(0x3, 0x3000, 0x78000000, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x5000) openat$sr(0xffffffffffffff9c, 0x0, 0x40b01, 0x0) ioctl$CDROMREADTOCENTRY(0xffffffffffffffff, 0x5306, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xa83}, 0x2308, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0xa) write(0xffffffffffffffff, &(0x7f0000000140)="90e45c77a9262d19f24754389003c4245182f02ed7b392eea7e6642dc86a48c82f48c3b5f57a71c67a24a860032faaa9c1a92efba1da04d3efa692b2f8de9e89faaea7cbab8f359508a195b5c263d0154f018fa87cced403ef966c7645cfff63", 0x60) 13:58:56 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:58:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x28, 0x14, 0x0, 0x101, 0x0, 0x0, {0x2, 0x9b}, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}]}, 0x28}}, 0x0) 13:58:56 executing program 7: clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x101342, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40087602, 0x0) [ 123.160395] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 123.161753] syz-executor.6 uses obsolete (PF_INET,SOCK_PACKET) [ 123.163700] EXT4-fs warning (device sda): __ext4_ioctl:1238: Setting inode version is not supported with metadata_csum enabled. 13:58:56 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), r0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) [ 123.222503] random: crng reseeded on system resumption 13:58:56 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), r0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 13:58:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x28, 0x14, 0x0, 0x101, 0x0, 0x0, {0x2, 0x9b}, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}]}, 0x28}}, 0x0) 13:58:56 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 123.318472] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 13:58:56 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, r2, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r5 = openat2(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0xb) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r6) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) perf_event_open(&(0x7f0000000140)={0x5, 0xffffffbd, 0x81, 0x80, 0x2, 0xca, 0x0, 0x0, 0x201, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x9}, 0x4000, 0x20000000000002, 0x20829c, 0x2, 0x8000cf4b, 0xaa6, 0xfffa, 0x0, 0x5, 0x0, 0x28e5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:58:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x28, 0x14, 0x0, 0x101, 0x0, 0x0, {0x2, 0x9b}, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}]}, 0x28}}, 0x0) 13:58:56 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400400, 0x50) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001500)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$nfs(&(0x7f00000001c0), &(0x7f0000000200)='.\x00', 0x6, 0x0, &(0x7f0000000240), 0x3000000, &(0x7f00000018c0)=ANY=[@ANYBLOB="646f6e745f44423105616973652c6673636f6e746578743d73746166665f752c646566636f6e746578743d757365725f752c657569643e", @ANYRESDEC=0xee00, @ANYBLOB="2c73ed61636b667368617469d03d5a8f9d704085bba79622a1dd06d250e808c6daee418900490e9d0b6000000100d9bb61ec102a29a51dfe213dde4d19a75bd21fc2654eae2da1144f47206bd0833033b735fd"]) pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000300)="4fc3a8c75f4761ccf8c41a6437353ce6fba6b1f3b1c84fe3bba0711e13d2ffb4f4c73090d996146d69abfcae8f3056b4a3794111f50d5cef716658885b4b65c8e48b7eca365301d4fef8da99a4c9c73ed3d37823d855e5d44f7f1a2af442006e3d1f15540cfe940e0c4ba8ba7be9c7935b65793c6e5620603b4cdff80c02c2f7db95143ba6be093769e6455c30e4a31fec0974ceb3e796d9f50e8a979eee01be1ba6bf2f86652680458c1ebfc320b267ed44bcaeaf3c23feb9f7aa31cfc6f39268533e3b817a0ca1bd87", 0xca}, {&(0x7f0000000400)="9fb6fa0976199172013b940bc31c676448d346d73d79b703676d91348d5b9f612ae1ba43fa27be58e3adb6e8339fba3afded609cf5cb0eeb7f82977012a90b40caff5f87f1275bf0573847455acad6d6729ac24e0ff76086cd0512a9893f1b1ebe50d03a298bb1c51a888c02fa5e58e44e959bdc97c78b2db891c1c775a1cd0e1ec0af2775eff5e3f2bd4eea458f14dffe9d9694cdce06fd05ae30169577765d603a0667c150d4162087224f8da6", 0xae}, {&(0x7f00000004c0)="3c0514fd6c466c16e17db8d77187d73f4c4b3b4e8954180e0e342ad887f7f4b183fb16d32a36ff6c0f60320114ebb12024846d17488c739b397c15cb3f17e939ce19988cd16ee007b2cf663cfd60525accb654182006b24f6c8d431fce197579787277d7c0f21057c7df2f044e732f209695d837e5132ebca26dc59d8cce772c6e699404638930603fc84d68fa90e65c55d4b3e8b6298cc2788c971e187caaa897eb2ff163390d9a99bd717118b1f666dc105329565ec79f6f3a509fc468daa2dd631443b1c1aeabc4f33b1c68a98014dc3a481066723019b674", 0xda}, {&(0x7f00000005c0)="82bfd2e80f72d03c4f3c44bfb61205aac64a1be5993c46c17fce4de86ad187b48b495d142fcd9751296a2a8df0cd4c3b35d2878ee07f550e6153c90652e4115fcdd33c0831d7ba19c0a719e20c2c05722cc0bbef56ce8ff6028ce4415fdf4c2b082db28e62a3826c548a07aa46c7bd85ba01b1cc2a7f11c83fc40067ee1b453409631451a84b6854c7c5bc87d673897cfffe1899657beba574daa630bcedba9bec6130dfb23b98666b79553de7fae35d50ee2a935bae51b312c6", 0xba}], 0x4, 0x6, 0x6) r4 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r4, 0x0, 0x0, 0x9) ioctl$FS_IOC_RESVSP(r4, 0x40305829, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8800000}) fallocate(r4, 0x1, 0x9, 0xdd) 13:58:56 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000480), r0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) [ 123.439289] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 13:58:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x28, 0x14, 0x0, 0x101, 0x0, 0x0, {0x2, 0x9b}, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}]}, 0x28}}, 0x0) 13:58:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) [ 123.534962] random: crng reseeded on system resumption [ 123.558918] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 123.860487] syz-executor.6 (4074) used greatest stack depth: 24408 bytes left [ 123.869988] random: crng reseeded on system resumption 13:58:56 executing program 4: r0 = syz_io_uring_setup(0x52d2, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x9, 0x0, 0x0) 13:58:56 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 13:58:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/timer\x00', 0x0, 0x0) 13:58:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="00000000d00b00002e2f66696c653100"]) r2 = io_uring_setup(0x5766, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r2, 0x4, 0x0, 0xfffffeed) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) fallocate(0xffffffffffffffff, 0x4, 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="fa1921df803613008b6abca5f40a7f3e8c2a2d648201809b9821a3b8f385b5b7a8bd542b9e1c45f8e3e56b41bb0ee9d59ecd7332c2d2c464c474cc3a6c8d822905a68c5ca4999044e6e056f0dc4ad5c23c1f", 0x52}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e13be9e0100af994fa2f6ae43a22eaf40415d54db9b61b57182d09d0b1e5bb2cc73eccd5c0", 0x36}, {0x0}], 0x3, 0x8001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x195300, 0x21) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, 0x0, 0x100000) 13:58:56 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 13:58:56 executing program 3: shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) r0 = shmget(0x2, 0x1000, 0x873c6edcc2f4f695, &(0x7f0000ffb000/0x1000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x7000) shmat(r1, &(0x7f0000ff9000/0x1000)=nil, 0x2000) r2 = shmget(0x3, 0x3000, 0x78000000, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x5000) openat$sr(0xffffffffffffff9c, 0x0, 0x40b01, 0x0) ioctl$CDROMREADTOCENTRY(0xffffffffffffffff, 0x5306, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xa83}, 0x2308, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='smaps\x00') pread64(r3, &(0x7f00000000c0)=""/98, 0x62, 0x7fff) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0xa) write(0xffffffffffffffff, &(0x7f0000000140)="90e45c77a9262d19f24754389003c4245182f02ed7b392eea7e6642dc86a48c82f48c3b5f57a71c67a24a860032faaa9c1a92efba1da04d3efa692b2f8de9e89faaea7cbab8f359508a195b5c263d0154f018fa87cced403ef966c7645cfff63", 0x60) 13:58:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="00000000d00b00002e2f66696c653100"]) r2 = io_uring_setup(0x5766, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r2, 0x4, 0x0, 0xfffffeed) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) fallocate(0xffffffffffffffff, 0x4, 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="fa1921df803613008b6abca5f40a7f3e8c2a2d648201809b9821a3b8f385b5b7a8bd542b9e1c45f8e3e56b41bb0ee9d59ecd7332c2d2c464c474cc3a6c8d822905a68c5ca4999044e6e056f0dc4ad5c23c1f", 0x52}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e13be9e0100af994fa2f6ae43a22eaf40415d54db9b61b57182d09d0b1e5bb2cc73eccd5c0", 0x36}, {0x0}], 0x3, 0x8001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x195300, 0x21) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, 0x0, 0x100000) 13:58:57 executing program 4: r0 = syz_io_uring_setup(0x52d2, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x9, 0x0, 0x0) 13:58:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/timer\x00', 0x0, 0x0) 13:58:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 13:58:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 13:58:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/timer\x00', 0x0, 0x0) 13:58:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 13:58:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) 13:58:57 executing program 4: r0 = syz_io_uring_setup(0x52d2, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x9, 0x0, 0x0) 13:58:57 executing program 4: r0 = syz_io_uring_setup(0x52d2, &(0x7f0000000080)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1, 0x0, 0x9, 0x0, 0x0) 13:58:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/timer\x00', 0x0, 0x0) [ 124.293377] syz-executor.0 (4127) used greatest stack depth: 23960 bytes left 13:58:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x49}}) 13:58:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="00000000d00b00002e2f66696c653100"]) r2 = io_uring_setup(0x5766, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r2, 0x4, 0x0, 0xfffffeed) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) fallocate(0xffffffffffffffff, 0x4, 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="fa1921df803613008b6abca5f40a7f3e8c2a2d648201809b9821a3b8f385b5b7a8bd542b9e1c45f8e3e56b41bb0ee9d59ecd7332c2d2c464c474cc3a6c8d822905a68c5ca4999044e6e056f0dc4ad5c23c1f", 0x52}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e13be9e0100af994fa2f6ae43a22eaf40415d54db9b61b57182d09d0b1e5bb2cc73eccd5c0", 0x36}, {0x0}], 0x3, 0x8001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(r3, &(0x7f0000000100)='./file1\x00', 0x195300, 0x21) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, 0x0, 0x100000) 13:58:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="00000000d00b00002e2f66696c653100"]) r2 = io_uring_setup(0x5766, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r2, 0x4, 0x0, 0xfffffeed) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) fallocate(0xffffffffffffffff, 0x4, 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="fa1921df803613008b6abca5f40a7f3e8c2a2d648201809b9821a3b8f385b5b7a8bd542b9e1c45f8e3e56b41bb0ee9d59ecd7332c2d2c464c474cc3a6c8d822905a68c5ca4999044e6e056f0dc4ad5c23c1f", 0x52}, {&(0x7f0000000000)="dbf225f5a4568675d4b9d93506777ce8e7e13be9e0100af994fa2f6ae43a22eaf40415d54db9b61b57182d09d0b1e5bb2cc73eccd5c0", 0x36}, {0x0}], 0x3, 0x8001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r4 = openat(0xfffffffff VM DIAGNOSIS: 13:58:54 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b1e41 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff88803e77f698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000020 R11=0000000000000001 R12=0000000000000020 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b1e30 RIP=ffffffff822b1e99 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f551a23e700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f28e2097368 CR3=00000000187cc000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f551cdaf7c0 00007f551cdaf7c8 YMM02=0000000000000000 0000000000000000 00007f551cdaf7e0 00007f551cdaf7c0 YMM03=0000000000000000 0000000000000000 00007f551cdaf7c8 00007f551cdaf7c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff8425f1a7 RDX=ffffed100d9c6f99 RSI=0000000000000004 RDI=ffff88806ce37cc0 RBP=ffff88806ce37cc0 RSP=ffff888008697be0 R8 =0000000000000000 R9 =ffff88806ce37cc3 R10=ffffed100d9c6f98 R11=0000000000000001 R12=0000000000000003 R13=ffffed100d9c6f98 R14=0000000000000001 R15=1ffff110010d2f7d RIP=ffffffff8425f224 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000559e4d7ac080 CR3=000000000de58000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 000003a800000006 00000260000001c8 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000