0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:09:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:09:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:09:33 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:09:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:09:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:09:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:09:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:09:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:09:44 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:09:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:09:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:09:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:09:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {0xffffffffffffffff, 0x30}, {r2}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:09:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:45 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {0xffffffffffffffff, 0x30}, {r2}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:09:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:09:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:09:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:09:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:09:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:09:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:09:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x40, 0x0, 0x1f}) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {0xffffffffffffffff, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:09:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:09:45 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:09:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {0xffffffffffffffff, 0x30}, {r2}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:09:57 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:09:57 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:09:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:09:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:09:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:09:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:09:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:09:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:09:57 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:57 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:09:57 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:09:57 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:09:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:10:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:10:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:10 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:10:10 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:10 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:10:10 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) 21:10:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) 21:10:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:10:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:10:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:10:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:10:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {0xffffffffffffffff, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:10:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x0, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:21 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:21 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:32 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:32 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {0xffffffffffffffff, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:10:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:32 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x0, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:32 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:10:33 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {0xffffffffffffffff, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:10:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:10:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:10:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:10:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x0, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x0, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:10:33 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:10:33 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:10:33 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:10:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:10:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x0, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:10:47 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:47 executing program 4: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:10:47 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:10:47 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:10:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:10:47 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:58 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:58 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:10:58 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:10:58 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:10:58 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:10:58 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:58 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:59 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:59 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:59 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:59 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:10:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:10:59 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:10:59 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:11:11 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:11:11 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:11:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:11:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:11:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:11 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:11:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:11 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:11 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:12 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:12 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:12 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:12 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:11:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:11:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(0x0, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:11:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {0xffffffffffffffff, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:11:25 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {0xffffffffffffffff, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(0x0, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:11:25 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {0xffffffffffffffff, 0x3341}], 0x9, 0x7f) 21:11:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:25 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x0, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:11:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:11:25 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x0, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:11:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:11:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x0, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:36 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:11:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(0x0, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:11:36 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {0xffffffffffffffff, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) 21:11:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) 21:11:36 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:11:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:11:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:11:36 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:11:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) 21:11:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:11:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:11:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:11:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:11:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:36 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:36 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x0, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:11:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:11:37 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:11:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:51 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x0, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:11:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:11:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:11:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:11:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:12:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:02 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) 21:12:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x0, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:02 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:12:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) 21:12:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x0, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x0, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:02 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:12:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x0, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:02 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x0, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x0, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:03 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x0, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:12:03 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x0, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) 21:12:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:12:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:12:15 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x0, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:15 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:12:15 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x0, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:12:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x0, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:12:28 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:12:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 21:12:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x0, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:28 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0x0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:39 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0x0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:12:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:12:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:12:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:12:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:39 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0x0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:39 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x0, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:12:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:12:39 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 21:12:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:39 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x0, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:40 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x0, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x349d}, {}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:12:51 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:12:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 21:12:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, 0x0, 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:12:51 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:12:51 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x0, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:12:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:13:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, 0x0, 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:04 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:13:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:13:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:13:04 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x0, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:13:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:13:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, 0x0, 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:04 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x0, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:04 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, 0x0, 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:04 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:13:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:13:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:13:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:13:04 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:04 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:13:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:04 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) 21:13:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:13:16 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r2 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r3, 0x0) r4 = accept(r3, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r3}, {0xffffffffffffffff, 0x8}, {r2, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r4, 0x3341}], 0x9, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:13:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:16 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:13:16 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:16 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x6) 21:13:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:13:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:13:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 21:13:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:13:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:13:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x6) 21:13:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000180)=0x9, 0x0) 21:13:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x6) 21:13:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000180)=0x9, 0x0) 21:13:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1, 0x802}, {}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000180)=0x9, 0x0) 21:13:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000180)=0x9, 0x0) 21:13:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x10, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 21:13:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) 21:13:29 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r1, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:29 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) 21:13:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 21:13:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:13:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:13:41 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) 21:13:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:13:41 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r1, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x10, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:41 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 21:13:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:13:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 21:13:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x10, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r1, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 21:13:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 21:13:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:13:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 21:13:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:13:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:13:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 21:13:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 21:13:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r1, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:13:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 21:13:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000180)=0x9, 0x0) 21:13:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 21:13:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000180)=0x9, 0x0) 21:13:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 21:13:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 21:13:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r7, &(0x7f0000000180)=0x9, 0x0) 21:13:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:14:06 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0}], 0x1, 0x7f) (fail_nth: 1) 21:14:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r1, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:14:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:14:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 1) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:14:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xfffffffc}, {0x6}]}) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:14:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) (fail_nth: 1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:14:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 21:14:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) (fail_nth: 1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) [ 1496.776876] FAULT_INJECTION: forcing a failure. [ 1496.776876] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1496.777763] CPU: 1 PID: 8953 Comm: syz-executor.7 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1496.778332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1496.778872] Call Trace: [ 1496.779058] [ 1496.779223] dump_stack_lvl+0xc1/0xf0 [ 1496.779509] should_fail_ex+0x4b4/0x5b0 [ 1496.779804] _copy_from_user+0x2e/0x180 [ 1496.780093] do_sys_poll+0x1aa/0xe20 [ 1496.780379] ? __pfx_do_sys_poll+0x10/0x10 [ 1496.780672] ? tracing_gen_ctx_irq_test+0x11f/0x1a0 [ 1496.781044] ? perf_tp_event+0x7c3/0x10c0 [ 1496.781335] ? mark_lock.part.0+0xef/0x2f30 [ 1496.781660] ? __pfx_perf_tp_event+0x10/0x10 [ 1496.781970] ? _kstrtoull+0x13f/0x200 [ 1496.782259] ? tracing_gen_ctx_irq_test+0x11f/0x1a0 [ 1496.782616] ? perf_tp_event+0x7c3/0x10c0 [ 1496.782936] ? __lock_acquire+0x1936/0x63b0 [ 1496.783236] ? __pfx___lock_acquire+0x10/0x10 [ 1496.783560] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1496.783908] ? ksys_write+0x218/0x260 [ 1496.784198] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1496.784552] ? perf_trace_preemptirq_template+0x252/0x420 [ 1496.784949] ? poll_select_set_timeout+0xdc/0x140 [ 1496.785278] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1496.785709] ? __pfx_lock_release+0x10/0x10 [ 1496.786005] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1496.786367] ? timespec64_add_safe+0x18d/0x210 [ 1496.786707] ? __pfx_timespec64_add_safe+0x10/0x10 [ 1496.787054] ? ktime_get_ts64+0x29a/0x2f0 [ 1496.787358] ? __pfx_read_tsc+0x10/0x10 [ 1496.787651] ? ktime_get_ts64+0x21e/0x2f0 [ 1496.787964] __x64_sys_poll+0x194/0x480 [ 1496.788255] ? __pfx___x64_sys_poll+0x10/0x10 [ 1496.788588] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1496.788969] ? syscall_enter_from_user_mode+0x21/0x50 [ 1496.789348] do_syscall_64+0x3f/0x90 [ 1496.789616] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1496.789983] RIP: 0033:0x7f4420679b19 [ 1496.790247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1496.791480] RSP: 002b:00007f441dbef188 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 1496.792004] RAX: ffffffffffffffda RBX: 00007f442078cf60 RCX: 00007f4420679b19 [ 1496.792504] RDX: 000000000000007f RSI: 0000000000000001 RDI: 0000000020000480 [ 1496.792995] RBP: 00007f441dbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1496.793484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1496.793981] R13: 00007ffe81692def R14: 00007f441dbef300 R15: 0000000000022000 [ 1496.794478] [ 1496.804759] FAULT_INJECTION: forcing a failure. [ 1496.804759] name failslab, interval 1, probability 0, space 0, times 1 [ 1496.805591] CPU: 1 PID: 8956 Comm: syz-executor.0 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1496.806124] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1496.806694] Call Trace: [ 1496.806894] [ 1496.807058] dump_stack_lvl+0xc1/0xf0 [ 1496.807340] should_fail_ex+0x4b4/0x5b0 [ 1496.807638] ? getname_flags.part.0+0x50/0x4f0 [ 1496.807970] should_failslab+0x9/0x20 [ 1496.808232] kmem_cache_alloc+0x5a/0x390 [ 1496.808559] ? fput+0x2f/0x1a0 [ 1496.808850] getname_flags.part.0+0x50/0x4f0 [ 1496.809181] __x64_sys_mkdirat+0x103/0x180 [ 1496.809481] do_syscall_64+0x3f/0x90 [ 1496.809752] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1496.810121] RIP: 0033:0x7fb90c9ccb19 [ 1496.810460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1496.811756] RSP: 002b:00007fb909f42188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1496.812283] RAX: ffffffffffffffda RBX: 00007fb90cadff60 RCX: 00007fb90c9ccb19 [ 1496.812748] RDX: 00000000000001ff RSI: 0000000020000100 RDI: ffffffffffffff9c [ 1496.813245] RBP: 00007fb909f421d0 R08: 0000000000000000 R09: 0000000000000000 [ 1496.813743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1496.814238] R13: 00007ffce451619f R14: 00007fb909f42300 R15: 0000000000022000 [ 1496.814752] [ 1496.825259] audit: type=1326 audit(1681506846.742:28): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8951 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f0c49a80b19 code=0x0 [ 1496.831938] FAULT_INJECTION: forcing a failure. [ 1496.831938] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1496.832984] CPU: 1 PID: 8959 Comm: syz-executor.4 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1496.833545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1496.834123] Call Trace: [ 1496.834310] [ 1496.834475] dump_stack_lvl+0xc1/0xf0 [ 1496.834751] should_fail_ex+0x4b4/0x5b0 [ 1496.835058] _copy_to_user+0x2e/0x150 [ 1496.835336] simple_read_from_buffer+0xd0/0x170 [ 1496.835682] proc_fail_nth_read+0x19c/0x230 [ 1496.835999] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1496.836348] ? security_file_permission+0xb5/0xe0 [ 1496.836702] vfs_read+0x260/0x930 [ 1496.836964] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1496.837309] ? __pfx_vfs_read+0x10/0x10 [ 1496.837604] ? __fget_files+0x270/0x480 [ 1496.837904] ksys_read+0x12b/0x260 [ 1496.838172] ? __pfx_ksys_read+0x10/0x10 [ 1496.838472] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1496.838866] do_syscall_64+0x3f/0x90 [ 1496.839136] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1496.839502] RIP: 0033:0x7f620855a69c [ 1496.839762] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1496.841001] RSP: 002b:00007f6205b1d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1496.841526] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f620855a69c [ 1496.842028] RDX: 000000000000000f RSI: 00007f6205b1d1e0 RDI: 0000000000000006 [ 1496.842519] RBP: 00007f6205b1d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1496.843036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1496.843536] R13: 00007ffda62b213f R14: 00007f6205b1d300 R15: 0000000000022000 [ 1496.844037] [ 1496.851497] FAULT_INJECTION: forcing a failure. [ 1496.851497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1496.853441] CPU: 0 PID: 8950 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1496.854515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1496.855578] Call Trace: [ 1496.855930] [ 1496.856245] dump_stack_lvl+0xc1/0xf0 [ 1496.856771] should_fail_ex+0x4b4/0x5b0 [ 1496.857327] _copy_from_user+0x2e/0x180 [ 1496.857880] ioctl_preallocate+0x9f/0x210 [ 1496.858436] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1496.859101] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1496.859790] do_vfs_ioctl+0x12b3/0x1690 [ 1496.860342] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1496.860919] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1496.861700] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1496.862466] ? lock_release+0x3da/0x680 [ 1496.863023] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1496.863852] ? __pfx_lock_release+0x10/0x10 [ 1496.864445] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1496.865186] ? selinux_file_ioctl+0xba/0x270 [ 1496.865806] __x64_sys_ioctl+0x110/0x210 [ 1496.866363] do_syscall_64+0x3f/0x90 [ 1496.866896] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1496.867591] RIP: 0033:0x7f560e93eb19 [ 1496.868092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1496.870462] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1496.870495] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1496.870516] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1496.870536] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 21:14:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) (fail_nth: 2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) [ 1496.870556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1496.870575] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1496.870618] 21:14:06 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0}], 0x1, 0x7f) (fail_nth: 2) 21:14:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) (fail_nth: 3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:14:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 2) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:14:06 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) [ 1497.005757] FAULT_INJECTION: forcing a failure. [ 1497.005757] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.009643] CPU: 1 PID: 8976 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1497.010180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1497.010708] Call Trace: [ 1497.010905] [ 1497.011063] dump_stack_lvl+0xc1/0xf0 [ 1497.011330] should_fail_ex+0x4b4/0x5b0 [ 1497.011607] ? jbd2__journal_start+0x194/0x810 [ 1497.011926] should_failslab+0x9/0x20 [ 1497.012190] kmem_cache_alloc+0x5a/0x390 [ 1497.012472] jbd2__journal_start+0x194/0x810 [ 1497.012790] __ext4_journal_start_sb+0x3d7/0x560 [ 1497.013115] ? ext4_dirty_inode+0xa5/0x130 [ 1497.013405] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 1497.013723] ext4_dirty_inode+0xa5/0x130 [ 1497.014005] __mark_inode_dirty+0x1aa/0xc10 [ 1497.014309] generic_update_time+0x21b/0x2b0 [ 1497.014616] file_modified_flags+0x2d4/0x330 [ 1497.014935] ? __pfx_file_modified_flags+0x10/0x10 [ 1497.015278] ? up_write+0x196/0x510 [ 1497.015535] ext4_fallocate+0x106b/0x3ad0 [ 1497.015841] ? __pfx_ext4_fallocate+0x10/0x10 [ 1497.016159] ? lock_is_held_type+0x9f/0x120 [ 1497.016461] ? __pfx_ext4_fallocate+0x10/0x10 [ 1497.016772] vfs_fallocate+0x48d/0xe30 [ 1497.017053] ioctl_preallocate+0x192/0x210 [ 1497.017344] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1497.017670] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1497.018023] do_vfs_ioctl+0x12b3/0x1690 [ 1497.018295] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1497.018588] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1497.018995] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1497.019382] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1497.019780] ? iget5_locked+0x198/0x210 [ 1497.020067] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1497.020427] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1497.020794] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1497.021166] ? security_file_ioctl+0x8d/0xb0 [ 1497.021472] ? __sanitizer_cov_trace_pc+0x60/0x70 [ 1497.021804] __x64_sys_ioctl+0x110/0x210 [ 1497.022085] do_syscall_64+0x3f/0x90 [ 1497.022342] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1497.022687] RIP: 0033:0x7f560e93eb19 [ 1497.022951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1497.024122] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1497.024647] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1497.025136] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1497.025621] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1497.026111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1497.026607] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1497.027117] 21:14:06 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r1 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r1, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) [ 1497.044502] FAULT_INJECTION: forcing a failure. [ 1497.044502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1497.046471] CPU: 0 PID: 8975 Comm: syz-executor.0 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1497.047529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1497.048561] Call Trace: [ 1497.048902] [ 1497.049211] dump_stack_lvl+0xc1/0xf0 [ 1497.049721] should_fail_ex+0x4b4/0x5b0 [ 1497.050271] strncpy_from_user+0x38/0x3f0 [ 1497.050833] getname_flags.part.0+0x95/0x4f0 [ 1497.051452] __x64_sys_mkdirat+0x103/0x180 [ 1497.052025] do_syscall_64+0x3f/0x90 [ 1497.052523] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1497.053199] RIP: 0033:0x7fb90c9ccb19 [ 1497.053689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1497.055969] RSP: 002b:00007fb909f42188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1497.056003] RAX: ffffffffffffffda RBX: 00007fb90cadff60 RCX: 00007fb90c9ccb19 [ 1497.056024] RDX: 00000000000001ff RSI: 0000000020000100 RDI: ffffffffffffff9c [ 1497.056045] RBP: 00007fb909f421d0 R08: 0000000000000000 R09: 0000000000000000 [ 1497.056065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1497.056084] R13: 00007ffce451619f R14: 00007fb909f42300 R15: 0000000000022000 [ 1497.056127] [ 1497.080459] FAULT_INJECTION: forcing a failure. [ 1497.080459] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1497.081514] CPU: 1 PID: 8972 Comm: syz-executor.7 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1497.082041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1497.082576] Call Trace: [ 1497.082754] [ 1497.082919] dump_stack_lvl+0xc1/0xf0 [ 1497.083183] should_fail_ex+0x4b4/0x5b0 [ 1497.083462] _copy_to_user+0x2e/0x150 [ 1497.083729] simple_read_from_buffer+0xd0/0x170 [ 1497.084055] proc_fail_nth_read+0x19c/0x230 [ 1497.084358] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1497.084687] ? security_file_permission+0xb5/0xe0 [ 1497.085030] vfs_read+0x260/0x930 [ 1497.085284] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1497.085615] ? __pfx_vfs_read+0x10/0x10 [ 1497.085911] ? __fget_files+0x270/0x480 [ 1497.086197] ksys_read+0x12b/0x260 [ 1497.086450] ? __pfx_ksys_read+0x10/0x10 [ 1497.086738] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1497.087138] do_syscall_64+0x3f/0x90 [ 1497.087392] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1497.087741] RIP: 0033:0x7f442062c69c [ 1497.087993] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1497.089214] RSP: 002b:00007f441dbef170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1497.089735] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f442062c69c [ 1497.090226] RDX: 000000000000000f RSI: 00007f441dbef1e0 RDI: 0000000000000005 [ 1497.090718] RBP: 00007f441dbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1497.091212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1497.091706] R13: 00007ffe81692def R14: 00007f441dbef300 R15: 0000000000022000 [ 1497.092213] 21:14:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 3) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:14:07 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:14:07 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0}], 0x1, 0x7f) 21:14:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 1) 21:14:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 1) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:14:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0}], 0x1, 0x7f) 21:14:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 4) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:14:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) (fail_nth: 4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:14:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:14:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x2, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:14:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) [ 1511.355145] FAULT_INJECTION: forcing a failure. [ 1511.355145] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1511.356371] CPU: 1 PID: 8998 Comm: syz-executor.3 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1511.356973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.357610] Call Trace: [ 1511.357632] [ 1511.357638] dump_stack_lvl+0xc1/0xf0 [ 1511.357662] should_fail_ex+0x4b4/0x5b0 [ 1511.357689] strncpy_from_user+0x38/0x3f0 [ 1511.357717] setxattr_copy+0x86/0x200 [ 1511.357738] setxattr+0xcb/0x170 [ 1511.357755] ? __pfx_setxattr+0x10/0x10 [ 1511.357773] ? __pfx___lock_acquire+0x10/0x10 [ 1511.357795] ? lock_acquire+0x19a/0x4c0 [ 1511.357811] ? find_held_lock+0x2c/0x110 [ 1511.357840] ? lock_acquire+0x19a/0x4c0 [ 1511.357856] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1511.357879] ? __pfx_lock_acquire+0x10/0x10 [ 1511.357904] ? lock_is_held_type+0x9f/0x120 [ 1511.357940] __x64_sys_fsetxattr+0x249/0x310 [ 1511.357959] ? syscall_enter_from_user_mode+0x21/0x50 [ 1511.357990] do_syscall_64+0x3f/0x90 [ 1511.358008] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1511.358030] RIP: 0033:0x7f9994f5db19 [ 1511.358043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1511.358059] RSP: 002b:00007f99924d3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1511.358077] RAX: ffffffffffffffda RBX: 00007f9995070f60 RCX: 00007f9994f5db19 [ 1511.358089] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1511.358101] RBP: 00007f99924d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 1511.358112] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1511.358123] R13: 00007ffdd4c16a1f R14: 00007f99924d3300 R15: 0000000000022000 [ 1511.358147] [ 1511.375797] FAULT_INJECTION: forcing a failure. [ 1511.375797] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.375829] CPU: 1 PID: 9005 Comm: syz-executor.0 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1511.375848] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.375857] Call Trace: [ 1511.375861] [ 1511.375867] dump_stack_lvl+0xc1/0xf0 [ 1511.375892] should_fail_ex+0x4b4/0x5b0 [ 1511.375915] ? jbd2__journal_start+0x194/0x810 [ 1511.375940] should_failslab+0x9/0x20 [ 1511.375964] kmem_cache_alloc+0x5a/0x390 [ 1511.375987] jbd2__journal_start+0x194/0x810 [ 1511.376015] __ext4_journal_start_sb+0x3d7/0x560 [ 1511.376036] ? ext4_dirty_inode+0xa5/0x130 [ 1511.384127] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 1511.384149] ext4_dirty_inode+0xa5/0x130 [ 1511.384170] __mark_inode_dirty+0x1aa/0xc10 [ 1511.384202] touch_atime+0x67b/0x730 [ 1511.384233] ? __pfx_touch_atime+0x10/0x10 [ 1511.384264] ? try_to_unlazy+0x2aa/0x660 [ 1511.384290] step_into+0x1291/0x2000 [ 1511.384311] ? __d_lookup_rcu+0x167/0x4c0 [ 1511.384335] ? __pfx_step_into+0x10/0x10 [ 1511.384368] walk_component+0xf5/0x5b0 [ 1511.387404] link_path_walk.part.0+0x76e/0xd90 [ 1511.387776] ? __pfx_link_path_walk.part.0+0x10/0x10 [ 1511.388184] path_parentat+0xa8/0x1b0 [ 1511.388492] filename_parentat+0x1c3/0x5b0 [ 1511.388518] ? __pfx_filename_parentat+0x10/0x10 [ 1511.388560] ? __create_object+0x3ee/0xc90 [ 1511.388588] ? lock_acquire+0x19a/0x4c0 [ 1511.388610] filename_create+0xa0/0x4a0 [ 1511.388634] ? __pfx_filename_create+0x10/0x10 [ 1511.388656] ? __pfx_lock_release+0x10/0x10 [ 1511.388676] ? __virt_addr_valid+0x102/0x340 [ 1511.388702] do_mkdirat+0x98/0x2d0 21:14:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 1511.388729] ? __pfx_do_mkdirat+0x10/0x10 [ 1511.388757] ? getname_flags.part.0+0x1dd/0x4f0 [ 1511.388785] __x64_sys_mkdirat+0x119/0x180 [ 1511.388813] do_syscall_64+0x3f/0x90 [ 1511.393147] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1511.393559] RIP: 0033:0x7fb90c9ccb19 [ 1511.393860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1511.395259] RSP: 002b:00007fb909f42188 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1511.395851] RAX: ffffffffffffffda RBX: 00007fb90cadff60 RCX: 00007fb90c9ccb19 [ 1511.396396] RDX: 00000000000001ff RSI: 0000000020000100 RDI: ffffffffffffff9c [ 1511.396942] RBP: 00007fb909f421d0 R08: 0000000000000000 R09: 0000000000000000 [ 1511.397477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1511.398023] R13: 00007ffce451619f R14: 00007fb909f42300 R15: 0000000000022000 [ 1511.398590] [ 1511.407502] FAULT_INJECTION: forcing a failure. [ 1511.407502] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.408904] CPU: 1 PID: 9010 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1511.409580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.410263] Call Trace: [ 1511.410479] [ 1511.410664] dump_stack_lvl+0xc1/0xf0 [ 1511.410996] should_fail_ex+0x4b4/0x5b0 [ 1511.411347] ? jbd2__journal_start+0x194/0x810 [ 1511.411731] should_failslab+0x9/0x20 [ 1511.412048] kmem_cache_alloc+0x5a/0x390 [ 1511.412389] jbd2__journal_start+0x194/0x810 [ 1511.412762] __ext4_journal_start_sb+0x3d7/0x560 [ 1511.413153] ? ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1511.413594] ? ext4_meta_trans_blocks+0x252/0x310 [ 1511.414000] ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1511.414435] ? __mark_inode_dirty+0x530/0xc10 [ 1511.414822] ? __pfx_ext4_alloc_file_blocks.isra.0+0x10/0x10 [ 1511.415306] ? __mnt_drop_write_file+0x4e/0xf0 [ 1511.415680] ? __pfx_file_modified_flags+0x10/0x10 [ 1511.416094] ext4_fallocate+0x1d28/0x3ad0 [ 1511.416447] ? __pfx_ext4_fallocate+0x10/0x10 [ 1511.416834] ? lock_is_held_type+0x9f/0x120 [ 1511.417185] ? __pfx_ext4_fallocate+0x10/0x10 [ 1511.417552] vfs_fallocate+0x48d/0xe30 [ 1511.417879] ioctl_preallocate+0x192/0x210 [ 1511.418228] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1511.418612] ? __pfx___lock_acquire+0x10/0x10 [ 1511.418970] ? ksys_write+0x218/0x260 [ 1511.419280] do_vfs_ioctl+0x12b3/0x1690 [ 1511.419592] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1511.419937] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1511.420381] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1511.420820] ? iget5_locked+0x198/0x210 [ 1511.421147] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1511.421619] ? __pfx_lock_release+0x10/0x10 [ 1511.421967] ? perf_trace_preemptirq_template+0x252/0x420 [ 1511.422406] ? selinux_file_ioctl+0xba/0x270 [ 1511.422756] __x64_sys_ioctl+0x110/0x210 [ 1511.423078] do_syscall_64+0x3f/0x90 [ 1511.423371] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1511.423764] RIP: 0033:0x7f560e93eb19 [ 1511.424061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1511.425429] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1511.426006] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1511.426569] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1511.427123] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1511.427670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1511.428200] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1511.428759] [ 1511.451643] FAULT_INJECTION: forcing a failure. [ 1511.451643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1511.453436] CPU: 0 PID: 9011 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1511.454213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.454988] Call Trace: [ 1511.455257] [ 1511.455491] dump_stack_lvl+0xc1/0xf0 [ 1511.455878] should_fail_ex+0x4b4/0x5b0 [ 1511.456284] strncpy_from_user+0x38/0x3f0 [ 1511.456715] setxattr_copy+0x86/0x200 [ 1511.457099] setxattr+0xcb/0x170 [ 1511.457443] ? __pfx_setxattr+0x10/0x10 [ 1511.457839] ? __pfx___lock_acquire+0x10/0x10 [ 1511.458294] ? lock_acquire+0x19a/0x4c0 [ 1511.458694] ? find_held_lock+0x2c/0x110 [ 1511.459128] ? lock_acquire+0x19a/0x4c0 [ 1511.459522] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1511.459981] ? __pfx_lock_acquire+0x10/0x10 [ 1511.460419] ? lock_is_held_type+0x9f/0x120 [ 1511.460870] __x64_sys_fsetxattr+0x249/0x310 [ 1511.461309] ? syscall_enter_from_user_mode+0x21/0x50 [ 1511.461834] do_syscall_64+0x3f/0x90 [ 1511.462206] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1511.462722] RIP: 0033:0x7f0c49a80b19 [ 1511.463100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1511.464805] RSP: 002b:00007f0c46ff6188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1511.465565] RAX: ffffffffffffffda RBX: 00007f0c49b93f60 RCX: 00007f0c49a80b19 [ 1511.466267] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1511.466974] RBP: 00007f0c46ff61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1511.467684] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1511.468386] R13: 00007ffe9f9edd4f R14: 00007f0c46ff6300 R15: 0000000000022000 [ 1511.469112] [ 1511.505863] FAULT_INJECTION: forcing a failure. [ 1511.505863] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.507456] CPU: 0 PID: 9019 Comm: syz-executor.3 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1511.508248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.509042] Call Trace: [ 1511.509303] [ 1511.509535] dump_stack_lvl+0xc1/0xf0 [ 1511.509936] should_fail_ex+0x4b4/0x5b0 [ 1511.510394] should_failslab+0x9/0x20 [ 1511.510797] __kmem_cache_alloc_node+0x5b/0x310 [ 1511.511289] ? kvmalloc_node+0xaa/0x200 [ 1511.511710] ? kvmalloc_node+0xaa/0x200 [ 1511.512125] __kmalloc_node+0x4d/0x160 [ 1511.512531] kvmalloc_node+0xaa/0x200 [ 1511.512924] vmemdup_user+0x26/0x110 [ 1511.513319] setxattr_copy+0x144/0x200 [ 1511.513727] setxattr+0xcb/0x170 [ 1511.514085] ? __pfx_setxattr+0x10/0x10 [ 1511.514494] ? __pfx___lock_acquire+0x10/0x10 [ 1511.514960] ? lock_acquire+0x19a/0x4c0 [ 1511.515386] ? lock_acquire+0x19a/0x4c0 [ 1511.515789] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1511.516267] ? __pfx_lock_acquire+0x10/0x10 [ 1511.516719] ? lock_is_held_type+0x9f/0x120 [ 1511.517186] __x64_sys_fsetxattr+0x249/0x310 [ 1511.517638] ? syscall_enter_from_user_mode+0x21/0x50 [ 1511.518174] do_syscall_64+0x3f/0x90 [ 1511.518562] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1511.519109] RIP: 0033:0x7f9994f5db19 [ 1511.519486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1511.521244] RSP: 002b:00007f99924d3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1511.521990] RAX: ffffffffffffffda RBX: 00007f9995070f60 RCX: 00007f9994f5db19 [ 1511.522683] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1511.523385] RBP: 00007f99924d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 1511.524087] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1511.524784] R13: 00007ffdd4c16a1f R14: 00007f99924d3300 R15: 0000000000022000 [ 1511.525496] 21:14:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 5) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:14:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b2f, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:14:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) (fail_nth: 5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:14:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 2) [ 1511.620639] FAULT_INJECTION: forcing a failure. [ 1511.620639] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.621658] CPU: 1 PID: 9033 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1511.622209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1511.622759] Call Trace: [ 1511.622951] [ 1511.623115] dump_stack_lvl+0xc1/0xf0 [ 1511.623393] should_fail_ex+0x4b4/0x5b0 [ 1511.623680] should_failslab+0x9/0x20 [ 1511.623956] __kmem_cache_alloc_node+0x5b/0x310 [ 1511.624280] ? kvmalloc_node+0xaa/0x200 [ 1511.624565] ? kvmalloc_node+0xaa/0x200 [ 1511.624837] __kmalloc_node+0x4d/0x160 [ 1511.625119] kvmalloc_node+0xaa/0x200 [ 1511.625392] vmemdup_user+0x26/0x110 [ 1511.625660] setxattr_copy+0x144/0x200 [ 1511.625939] setxattr+0xcb/0x170 [ 1511.626186] ? __pfx_setxattr+0x10/0x10 [ 1511.626465] ? __pfx___lock_acquire+0x10/0x10 [ 1511.626787] ? lock_acquire+0x19a/0x4c0 [ 1511.627075] ? lock_acquire+0x19a/0x4c0 [ 1511.627354] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1511.627683] ? __pfx_lock_acquire+0x10/0x10 [ 1511.627998] ? lock_is_held_type+0x9f/0x120 [ 1511.628315] __x64_sys_fsetxattr+0x249/0x310 [ 1511.628619] ? syscall_enter_from_user_mode+0x21/0x50 [ 1511.628992] do_syscall_64+0x3f/0x90 [ 1511.629259] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1511.629624] RIP: 0033:0x7f0c49a80b19 [ 1511.629884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1511.631112] RSP: 002b:00007f0c46ff6188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1511.631646] RAX: ffffffffffffffda RBX: 00007f0c49b93f60 RCX: 00007f0c49a80b19 [ 1511.632131] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1511.632611] RBP: 00007f0c46ff61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1511.633084] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1511.633562] R13: 00007ffe9f9edd4f R14: 00007f0c46ff6300 R15: 0000000000022000 [ 1511.634065] 21:14:33 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:14:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 3) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:14:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) (fail_nth: 6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:14:33 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x8}], 0x1, 0x7f) 21:14:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:14:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 6) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:14:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b30, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:14:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 3) 21:14:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 4) [ 1523.544120] FAULT_INJECTION: forcing a failure. [ 1523.544120] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1523.545217] CPU: 1 PID: 9052 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1523.545753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1523.546301] Call Trace: [ 1523.546479] [ 1523.546639] dump_stack_lvl+0xc1/0xf0 [ 1523.546909] should_fail_ex+0x4b4/0x5b0 [ 1523.547191] _copy_from_user+0x2e/0x180 [ 1523.547477] vmemdup_user+0x6d/0x110 [ 1523.547744] setxattr_copy+0x144/0x200 [ 1523.548023] setxattr+0xcb/0x170 [ 1523.548264] ? __pfx_setxattr+0x10/0x10 [ 1523.548540] ? __pfx___lock_acquire+0x10/0x10 [ 1523.548853] ? lock_acquire+0x19a/0x4c0 [ 1523.549132] ? lock_acquire+0x19a/0x4c0 [ 1523.549404] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1523.549719] ? __pfx_lock_acquire+0x10/0x10 [ 1523.550015] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1523.550387] ? lock_is_held_type+0x9f/0x120 [ 1523.550700] __x64_sys_fsetxattr+0x249/0x310 [ 1523.551017] ? syscall_enter_from_user_mode+0x21/0x50 [ 1523.551388] do_syscall_64+0x3f/0x90 [ 1523.551651] entry_SYSCALL_64_after_hwframe+0x72/0xdc 21:14:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 1523.551670] RIP: 0033:0x7f0c49a80b19 [ 1523.551682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1523.551698] RSP: 002b:00007f0c46ff6188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1523.551714] RAX: ffffffffffffffda RBX: 00007f0c49b93f60 RCX: 00007f0c49a80b19 [ 1523.551725] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1523.551735] RBP: 00007f0c46ff61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1523.551745] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1523.551755] R13: 00007ffe9f9edd4f R14: 00007f0c46ff6300 R15: 0000000000022000 [ 1523.551777] [ 1523.585809] FAULT_INJECTION: forcing a failure. [ 1523.585809] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1523.585870] CPU: 0 PID: 9056 Comm: syz-executor.0 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1523.585904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1523.585925] Call Trace: [ 1523.585934] [ 1523.585945] dump_stack_lvl+0xc1/0xf0 [ 1523.585985] should_fail_ex+0x4b4/0x5b0 [ 1523.586027] _copy_to_user+0x2e/0x150 [ 1523.586066] simple_read_from_buffer+0xd0/0x170 [ 1523.586120] proc_fail_nth_read+0x19c/0x230 [ 1523.586166] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1523.586209] ? security_file_permission+0xb5/0xe0 [ 1523.586263] vfs_read+0x260/0x930 [ 1523.586310] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1523.586351] ? __pfx_vfs_read+0x10/0x10 [ 1523.586395] ? kasan_quarantine_put+0x81/0x1d0 [ 1523.586439] ? __fget_files+0x270/0x480 [ 1523.586497] ksys_read+0x12b/0x260 [ 1523.586544] ? __pfx_ksys_read+0x10/0x10 [ 1523.586596] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1523.586659] do_syscall_64+0x3f/0x90 [ 1523.586692] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1523.586728] RIP: 0033:0x7fb90c97f69c [ 1523.586750] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1523.586780] RSP: 002b:00007fb909f42170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1523.586812] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fb90c97f69c [ 1523.586833] RDX: 000000000000000f RSI: 00007fb909f421e0 RDI: 0000000000000005 [ 1523.586853] RBP: 00007fb909f421d0 R08: 0000000000000000 R09: 0000000000000000 [ 1523.586873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1523.586892] R13: 00007ffce451619f R14: 00007fb909f42300 R15: 0000000000022000 [ 1523.586937] [ 1523.599635] FAULT_INJECTION: forcing a failure. [ 1523.599635] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.599815] CPU: 0 PID: 9054 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1523.599849] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1523.599865] Call Trace: [ 1523.599873] [ 1523.599883] dump_stack_lvl+0xc1/0xf0 [ 1523.599924] should_fail_ex+0x4b4/0x5b0 [ 1523.599966] should_failslab+0x9/0x20 [ 1523.600003] __kmem_cache_alloc_node+0x5b/0x310 [ 1523.600038] ? ext4_find_extent+0xa41/0xd30 [ 1523.600077] ? find_held_lock+0x2c/0x110 [ 1523.600128] FAULT_INJECTION: forcing a failure. [ 1523.600128] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1523.600123] ? ext4_find_extent+0xa41/0xd30 [ 1523.600163] __kmalloc+0x4a/0x160 [ 1523.600198] ext4_find_extent+0xa41/0xd30 [ 1523.600254] ext4_ext_map_blocks+0x1c7/0x5970 [ 1523.600306] ? __lock_acquire+0x1936/0x63b0 [ 1523.600357] ? lock_acquire+0x19a/0x4c0 [ 1523.600388] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1523.600433] ? percpu_counter_add_batch+0x14b/0x180 [ 1523.600469] ? lock_release+0x1e3/0x680 [ 1523.600498] ? find_held_lock+0x2c/0x110 [ 1523.600543] ? __down_read_common+0x86b/0x11e0 [ 1523.600583] ? lock_acquire+0x19a/0x4c0 [ 1523.600612] ? ext4_map_blocks+0x270/0x19e0 [ 1523.600662] ? __pfx___down_read_common+0x10/0x10 [ 1523.600704] ? __pfx_lock_acquire+0x10/0x10 [ 1523.600736] ? percpu_counter_add_batch+0xc8/0x180 [ 1523.600774] ? lock_is_held_type+0x9f/0x120 [ 1523.600843] ext4_map_blocks+0xb15/0x19e0 [ 1523.600897] ? kmem_cache_alloc+0x307/0x390 [ 1523.600935] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1523.600986] ? jbd2__journal_start+0xf7/0x810 [ 1523.601037] ? __ext4_journal_start_sb+0x3d7/0x560 [ 1523.601071] ? __ext4_journal_start_sb+0x1e0/0x560 [ 1523.601105] ? ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1523.601146] ? ext4_meta_trans_blocks+0x252/0x310 [ 1523.601201] ext4_alloc_file_blocks.isra.0+0x2df/0xbd0 [ 1523.601245] ? __mark_inode_dirty+0x530/0xc10 [ 1523.601304] ? __pfx_ext4_alloc_file_blocks.isra.0+0x10/0x10 [ 1523.601345] ? __mnt_drop_write_file+0x4e/0xf0 [ 1523.601385] ? __pfx_file_modified_flags+0x10/0x10 [ 1523.601440] ? up_write+0x196/0x510 [ 1523.601483] ext4_fallocate+0x1d28/0x3ad0 [ 1523.601546] ? __pfx_ext4_fallocate+0x10/0x10 [ 1523.601596] ? lock_is_held_type+0x9f/0x120 [ 1523.601647] ? __pfx_ext4_fallocate+0x10/0x10 [ 1523.601693] vfs_fallocate+0x48d/0xe30 [ 1523.601755] ioctl_preallocate+0x192/0x210 [ 1523.601791] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1523.601838] ? __pfx___lock_acquire+0x10/0x10 [ 1523.601866] ? ksys_write+0x218/0x260 [ 1523.601925] do_vfs_ioctl+0x12b3/0x1690 [ 1523.601964] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1523.602006] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1523.602044] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1523.602085] ? iget5_locked+0x198/0x210 [ 1523.602133] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1523.602177] ? __pfx_lock_release+0x10/0x10 [ 1523.602218] ? perf_trace_preemptirq_template+0x252/0x420 [ 1523.602274] ? selinux_file_ioctl+0xba/0x270 [ 1523.602324] __x64_sys_ioctl+0x110/0x210 [ 1523.602365] do_syscall_64+0x3f/0x90 [ 1523.602398] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1523.602433] RIP: 0033:0x7f560e93eb19 [ 1523.602455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1523.602485] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1523.602516] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1523.602538] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1523.602558] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1523.602578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1523.602597] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1523.602644] [ 1523.602654] CPU: 1 PID: 9059 Comm: syz-executor.3 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1523.602672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1523.602680] Call Trace: [ 1523.602684] [ 1523.602689] dump_stack_lvl+0xc1/0xf0 [ 1523.602706] should_fail_ex+0x4b4/0x5b0 [ 1523.602727] _copy_from_user+0x2e/0x180 [ 1523.602746] vmemdup_user+0x6d/0x110 [ 1523.602764] setxattr_copy+0x144/0x200 [ 1523.602782] setxattr+0xcb/0x170 [ 1523.602798] ? __pfx_setxattr+0x10/0x10 [ 1523.602814] ? __pfx___lock_acquire+0x10/0x10 [ 1523.602832] ? lock_acquire+0x19a/0x4c0 [ 1523.602852] ? lock_acquire+0x19a/0x4c0 [ 1523.602866] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1523.602886] ? __pfx_lock_acquire+0x10/0x10 [ 1523.602909] ? lock_is_held_type+0x9f/0x120 [ 1523.602941] __x64_sys_fsetxattr+0x249/0x310 [ 1523.602960] ? syscall_enter_from_user_mode+0x21/0x50 [ 1523.602989] do_syscall_64+0x3f/0x90 [ 1523.603005] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1523.603023] RIP: 0033:0x7f9994f5db19 [ 1523.603034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1523.603048] RSP: 002b:00007f99924d3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1523.603064] RAX: ffffffffffffffda RBX: 00007f9995070f60 RCX: 00007f9994f5db19 [ 1523.603075] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1523.603085] RBP: 00007f99924d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 1523.603095] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1523.603104] R13: 00007ffdd4c16a1f R14: 00007f99924d3300 R15: 0000000000022000 [ 1523.603127] 21:14:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 5) 21:14:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b31, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:14:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:14:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 5) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:14:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 7) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:14:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:14:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x64}], 0x1, 0x7f) 21:14:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, 0x0, &(0x7f0000000440)) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) [ 1537.656396] FAULT_INJECTION: forcing a failure. [ 1537.656396] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.658042] CPU: 1 PID: 9084 Comm: syz-executor.3 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1537.658101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1537.658117] Call Trace: [ 1537.658125] [ 1537.658135] dump_stack_lvl+0xc1/0xf0 [ 1537.658173] should_fail_ex+0x4b4/0x5b0 [ 1537.658213] should_failslab+0x9/0x20 [ 1537.658245] __kmem_cache_alloc_node+0x5b/0x310 [ 1537.658279] ? security_context_to_sid_core+0xaf/0x870 [ 1537.658317] ? security_context_to_sid_core+0xaf/0x870 [ 1537.658347] __kmalloc_node_track_caller+0x4b/0x160 [ 1537.658385] kmemdup_nul+0x36/0xb0 [ 1537.658434] security_context_to_sid_core+0xaf/0x870 [ 1537.658464] ? avc_has_perm_noaudit+0x148/0x3a0 [ 1537.658510] ? __pfx_security_context_to_sid_core+0x10/0x10 [ 1537.658542] ? avc_has_perm+0xfe/0x1a0 [ 1537.658584] ? __pfx_avc_has_perm+0x10/0x10 [ 1537.658643] selinux_inode_setxattr+0x369/0x8a0 [ 1537.668874] ? __pfx_selinux_inode_setxattr+0x10/0x10 [ 1537.669546] ? __pfx_lock_acquire+0x10/0x10 [ 1537.669797] FAULT_INJECTION: forcing a failure. [ 1537.669797] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.670100] ? make_vfsgid+0x113/0x170 [ 1537.670149] ? __pfx___lock_acquire+0x10/0x10 [ 1537.670177] ? lock_is_held_type+0x9f/0x120 [ 1537.670234] security_inode_setxattr+0xfd/0x1b0 [ 1537.670280] __vfs_setxattr_locked+0xad/0x260 [ 1537.670313] ? __might_fault+0xe2/0x190 [ 1537.670358] vfs_setxattr+0x143/0x340 [ 1537.670397] ? __pfx_vfs_setxattr+0x10/0x10 [ 1537.670446] do_setxattr+0x14b/0x190 [ 1537.670481] setxattr+0x14d/0x170 [ 1537.670514] ? __pfx_setxattr+0x10/0x10 [ 1537.677405] ? __pfx___lock_acquire+0x10/0x10 [ 1537.677993] ? lock_acquire+0x19a/0x4c0 [ 1537.678504] ? lock_acquire+0x19a/0x4c0 [ 1537.679028] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1537.679640] ? __pfx_lock_acquire+0x10/0x10 [ 1537.680192] ? lock_is_held_type+0x9f/0x120 [ 1537.680788] __x64_sys_fsetxattr+0x249/0x310 [ 1537.681356] ? syscall_enter_from_user_mode+0x21/0x50 [ 1537.682044] do_syscall_64+0x3f/0x90 [ 1537.682521] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1537.683193] RIP: 0033:0x7f9994f5db19 [ 1537.683705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1537.685945] RSP: 002b:00007f99924d3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1537.686903] RAX: ffffffffffffffda RBX: 00007f9995070f60 RCX: 00007f9994f5db19 [ 1537.687808] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1537.688693] RBP: 00007f99924d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 1537.689583] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1537.690511] R13: 00007ffdd4c16a1f R14: 00007f99924d3300 R15: 0000000000022000 [ 1537.691434] [ 1537.691751] CPU: 0 PID: 9077 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1537.692781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1537.693801] Call Trace: [ 1537.694140] [ 1537.694442] dump_stack_lvl+0xc1/0xf0 [ 1537.694940] should_fail_ex+0x4b4/0x5b0 [ 1537.695488] should_failslab+0x9/0x20 [ 1537.695989] __kmem_cache_alloc_node+0x5b/0x310 [ 1537.696590] ? security_context_to_sid_core+0xaf/0x870 [ 1537.697272] ? security_context_to_sid_core+0xaf/0x870 [ 1537.697934] __kmalloc_node_track_caller+0x4b/0x160 [ 1537.698589] kmemdup_nul+0x36/0xb0 [ 1537.699080] security_context_to_sid_core+0xaf/0x870 [ 1537.699962] ? avc_has_perm_noaudit+0x148/0x3a0 [ 1537.700759] ? __pfx_security_context_to_sid_core+0x10/0x10 [ 1537.700801] ? avc_has_perm+0xfe/0x1a0 [ 1537.700852] ? __pfx_avc_has_perm+0x10/0x10 [ 1537.700923] selinux_inode_setxattr+0x369/0x8a0 [ 1537.700977] ? __pfx_selinux_inode_setxattr+0x10/0x10 [ 1537.701021] ? __pfx_lock_acquire+0x10/0x10 [ 1537.701054] ? make_vfsgid+0x113/0x170 [ 1537.701111] ? __pfx___lock_acquire+0x10/0x10 [ 1537.701143] ? lock_is_held_type+0x9f/0x120 [ 1537.701213] security_inode_setxattr+0xfd/0x1b0 [ 1537.701269] __vfs_setxattr_locked+0xad/0x260 [ 1537.701308] ? __might_fault+0xe2/0x190 [ 1537.701363] vfs_setxattr+0x143/0x340 [ 1537.701409] ? __pfx_vfs_setxattr+0x10/0x10 [ 1537.701468] do_setxattr+0x14b/0x190 [ 1537.701510] setxattr+0x14d/0x170 [ 1537.701546] ? __pfx_setxattr+0x10/0x10 [ 1537.701581] ? __pfx___lock_acquire+0x10/0x10 [ 1537.712257] ? lock_acquire+0x19a/0x4c0 [ 1537.712770] ? lock_acquire+0x19a/0x4c0 [ 1537.713289] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1537.713889] ? __pfx_lock_acquire+0x10/0x10 [ 1537.714452] ? lock_is_held_type+0x9f/0x120 [ 1537.715019] __x64_sys_fsetxattr+0x249/0x310 [ 1537.715618] ? syscall_enter_from_user_mode+0x21/0x50 [ 1537.716307] do_syscall_64+0x3f/0x90 [ 1537.716794] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1537.717429] RIP: 0033:0x7f0c49a80b19 [ 1537.717911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1537.720154] RSP: 002b:00007f0c46ff6188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1537.721105] RAX: ffffffffffffffda RBX: 00007f0c49b93f60 RCX: 00007f0c49a80b19 [ 1537.721996] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1537.722877] RBP: 00007f0c46ff61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1537.723780] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1537.724668] R13: 00007ffe9f9edd4f R14: 00007f0c46ff6300 R15: 0000000000022000 [ 1537.725569] 21:14:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/799], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:14:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 8) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:14:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b32, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) [ 1537.870598] FAULT_INJECTION: forcing a failure. [ 1537.870598] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.872806] CPU: 0 PID: 9097 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1537.873798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1537.874798] Call Trace: [ 1537.875139] [ 1537.875445] dump_stack_lvl+0xc1/0xf0 [ 1537.875941] should_fail_ex+0x4b4/0x5b0 [ 1537.876461] ? __es_insert_extent+0x3a9/0x12f0 [ 1537.877058] should_failslab+0x9/0x20 [ 1537.877552] kmem_cache_alloc+0x5a/0x390 [ 1537.878077] __es_insert_extent+0x3a9/0x12f0 [ 1537.878666] ? do_raw_write_lock+0x11e/0x3b0 [ 1537.879240] ? __pfx_do_raw_write_lock+0x10/0x10 [ 1537.879873] ext4_es_insert_extent+0x2db/0xb30 [ 1537.880483] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 1537.881140] ? __pfx_lock_release+0x10/0x10 [ 1537.881680] ? kasan_set_track+0x25/0x30 [ 1537.882218] ? __pfx_ext4_es_is_delayed+0x10/0x10 [ 1537.882838] ? __es_find_extent_range+0x197/0x4b0 [ 1537.883466] ? do_raw_read_unlock+0x44/0xe0 [ 1537.884040] ext4_ext_map_blocks+0x18e9/0x5970 [ 1537.884627] ? __lock_acquire+0x1936/0x63b0 [ 1537.885218] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1537.885860] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1537.886510] ? lock_acquire+0x19a/0x4c0 [ 1537.887001] ? find_held_lock+0x2c/0x110 [ 1537.887550] ? __down_read_common+0x86b/0x11e0 [ 1537.888144] ? lock_acquire+0x19a/0x4c0 [ 1537.888656] ? ext4_map_blocks+0x270/0x19e0 [ 1537.889224] ? __pfx___down_read_common+0x10/0x10 [ 1537.889827] ? __pfx_lock_acquire+0x10/0x10 [ 1537.890386] ? percpu_counter_add_batch+0xc8/0x180 [ 1537.890992] ? lock_is_held_type+0x9f/0x120 [ 1537.891608] ext4_map_blocks+0xb15/0x19e0 [ 1537.892171] ? kmem_cache_alloc+0x307/0x390 [ 1537.892728] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1537.893319] ? jbd2__journal_start+0xf7/0x810 [ 1537.893925] ? __ext4_journal_start_sb+0x3d7/0x560 [ 1537.894533] ? __ext4_journal_start_sb+0x1e0/0x560 [ 1537.895171] ? ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1537.895853] ? ext4_meta_trans_blocks+0x252/0x310 [ 1537.896502] ext4_alloc_file_blocks.isra.0+0x2df/0xbd0 [ 1537.897181] ? __mark_inode_dirty+0x530/0xc10 [ 1537.897768] ? __pfx_ext4_alloc_file_blocks.isra.0+0x10/0x10 [ 1537.898518] ? __mnt_drop_write_file+0x4e/0xf0 [ 1537.899094] ? __pfx_file_modified_flags+0x10/0x10 [ 1537.899766] ? up_write+0x196/0x510 [ 1537.900252] ext4_fallocate+0x1d28/0x3ad0 [ 1537.900796] ? __pfx_ext4_fallocate+0x10/0x10 [ 1537.901401] ? lock_is_held_type+0x9f/0x120 [ 1537.901984] ? __pfx_ext4_fallocate+0x10/0x10 [ 1537.902577] vfs_fallocate+0x48d/0xe30 [ 1537.903122] ioctl_preallocate+0x192/0x210 [ 1537.903694] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1537.904315] ? __pfx___lock_acquire+0x10/0x10 [ 1537.904890] ? ksys_write+0x218/0x260 [ 1537.905412] do_vfs_ioctl+0x12b3/0x1690 [ 1537.905934] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1537.906498] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1537.907215] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1537.907968] ? iget5_locked+0x198/0x210 [ 1537.908512] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1537.909283] ? __pfx_lock_release+0x10/0x10 [ 1537.909844] ? perf_trace_preemptirq_template+0x252/0x420 [ 1537.910560] ? selinux_file_ioctl+0xba/0x270 [ 1537.911147] __x64_sys_ioctl+0x110/0x210 [ 1537.911700] do_syscall_64+0x3f/0x90 [ 1537.912188] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1537.912844] RIP: 0033:0x7f560e93eb19 [ 1537.913324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1537.915550] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1537.916498] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1537.917390] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1537.918274] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1537.919151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1537.920073] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1537.920995] 21:14:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 6) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:14:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x5d8}], 0x1, 0x7f) 21:14:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, 0x0, &(0x7f0000000440)) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:14:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:14:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 6) 21:14:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x54) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:14:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b33, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:14:48 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x6400}], 0x1, 0x7f) 21:14:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 7) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:14:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 7) [ 1538.196745] FAULT_INJECTION: forcing a failure. [ 1538.196745] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.198223] CPU: 1 PID: 9126 Comm: syz-executor.3 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1538.199203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1538.200222] Call Trace: [ 1538.200553] [ 1538.200845] dump_stack_lvl+0xc1/0xf0 [ 1538.201341] should_fail_ex+0x4b4/0x5b0 [ 1538.201858] ? jbd2__journal_start+0x194/0x810 [ 1538.202445] should_failslab+0x9/0x20 [ 1538.202936] kmem_cache_alloc+0x5a/0x390 [ 1538.203463] jbd2__journal_start+0x194/0x810 [ 1538.204036] __ext4_journal_start_sb+0x3d7/0x560 [ 1538.204653] ? ext4_xattr_set+0x245/0x370 [ 1538.205190] ? ext4_xattr_set_credits+0x199/0x210 [ 1538.205823] ext4_xattr_set+0x245/0x370 [ 1538.206352] ? __pfx_ext4_xattr_set+0x10/0x10 [ 1538.206948] ? xattr_resolve_name+0x26e/0x3e0 [ 1538.207567] ? __pfx_ext4_xattr_security_set+0x10/0x10 [ 1538.208221] __vfs_setxattr+0x175/0x1e0 [ 1538.208734] ? __pfx___vfs_setxattr+0x10/0x10 [ 1538.209298] ? __pfx___lock_acquire+0x10/0x10 [ 1538.209864] ? lock_is_held_type+0x9f/0x120 [ 1538.210426] __vfs_setxattr_noperm+0x129/0x600 [ 1538.211031] __vfs_setxattr_locked+0x1d7/0x260 [ 1538.211643] ? __might_fault+0xe2/0x190 [ 1538.212176] vfs_setxattr+0x143/0x340 [ 1538.212684] ? __pfx_vfs_setxattr+0x10/0x10 [ 1538.213262] do_setxattr+0x14b/0x190 [ 1538.213771] setxattr+0x14d/0x170 [ 1538.214236] ? __pfx_setxattr+0x10/0x10 [ 1538.214750] ? __pfx___lock_acquire+0x10/0x10 [ 1538.215335] ? lock_acquire+0x19a/0x4c0 [ 1538.215857] ? lock_acquire+0x19a/0x4c0 [ 1538.216377] ? __x64_sys_fsetxattr+0x17a/0x310 21:14:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 9) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) [ 1538.216983] ? __pfx_lock_acquire+0x10/0x10 [ 1538.217674] ? lock_is_held_type+0x9f/0x120 [ 1538.218260] __x64_sys_fsetxattr+0x249/0x310 [ 1538.218832] ? syscall_enter_from_user_mode+0x21/0x50 [ 1538.219542] do_syscall_64+0x3f/0x90 [ 1538.220032] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1538.220690] RIP: 0033:0x7f9994f5db19 [ 1538.221172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1538.223407] RSP: 002b:00007f99924d3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1538.224357] RAX: ffffffffffffffda RBX: 00007f9995070f60 RCX: 00007f9994f5db19 [ 1538.225246] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1538.226130] RBP: 00007f99924d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 1538.227006] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1538.227909] R13: 00007ffdd4c16a1f R14: 00007f99924d3300 R15: 0000000000022000 [ 1538.228822] [ 1538.299812] FAULT_INJECTION: forcing a failure. [ 1538.299812] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.301687] CPU: 0 PID: 9129 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1538.302703] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1538.303727] Call Trace: [ 1538.304063] [ 1538.304367] dump_stack_lvl+0xc1/0xf0 [ 1538.304871] should_fail_ex+0x4b4/0x5b0 [ 1538.305397] ? jbd2__journal_start+0x194/0x810 [ 1538.305996] should_failslab+0x9/0x20 [ 1538.306494] kmem_cache_alloc+0x5a/0x390 [ 1538.307026] jbd2__journal_start+0x194/0x810 [ 1538.307619] __ext4_journal_start_sb+0x3d7/0x560 [ 1538.308234] ? ext4_xattr_set+0x245/0x370 [ 1538.308784] ? ext4_xattr_set_credits+0x199/0x210 [ 1538.309429] ext4_xattr_set+0x245/0x370 [ 1538.309978] ? __pfx_ext4_xattr_set+0x10/0x10 [ 1538.310579] ? xattr_resolve_name+0x26e/0x3e0 [ 1538.311162] ? __pfx_ext4_xattr_security_set+0x10/0x10 [ 1538.311867] __vfs_setxattr+0x175/0x1e0 [ 1538.311904] ? __pfx___vfs_setxattr+0x10/0x10 [ 1538.313037] ? __pfx___lock_acquire+0x10/0x10 [ 1538.313614] ? lock_is_held_type+0x9f/0x120 [ 1538.314194] __vfs_setxattr_noperm+0x129/0x600 [ 1538.314792] __vfs_setxattr_locked+0x1d7/0x260 [ 1538.315386] ? __might_fault+0xe2/0x190 [ 1538.315928] vfs_setxattr+0x143/0x340 [ 1538.316431] ? __pfx_vfs_setxattr+0x10/0x10 [ 1538.317007] do_setxattr+0x14b/0x190 [ 1538.317509] setxattr+0x14d/0x170 [ 1538.317973] ? __pfx_setxattr+0x10/0x10 [ 1538.318488] ? __pfx___lock_acquire+0x10/0x10 [ 1538.319067] ? lock_acquire+0x19a/0x4c0 [ 1538.319603] ? lock_acquire+0x19a/0x4c0 [ 1538.320112] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1538.320707] ? __pfx_lock_acquire+0x10/0x10 [ 1538.321269] ? lock_is_held_type+0x9f/0x120 [ 1538.321853] __x64_sys_fsetxattr+0x249/0x310 [ 1538.322423] ? syscall_enter_from_user_mode+0x21/0x50 [ 1538.323098] do_syscall_64+0x3f/0x90 [ 1538.323601] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1538.324255] RIP: 0033:0x7f0c49a80b19 [ 1538.324739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1538.327413] RSP: 002b:00007f0c46ff6188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1538.328467] RAX: ffffffffffffffda RBX: 00007f0c49b93f60 RCX: 00007f0c49a80b19 [ 1538.329364] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1538.330251] RBP: 00007f0c46ff61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1538.331133] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1538.332031] R13: 00007ffe9f9edd4f R14: 00007f0c46ff6300 R15: 0000000000022000 [ 1538.332932] 21:15:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:15:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0xd805}], 0x1, 0x7f) 21:15:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 8) 21:15:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 8) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:15:01 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000980)=0x0) perf_event_open(&(0x7f0000000900)={0x6, 0x80, 0x8a, 0x20, 0x2, 0x3a, 0x0, 0xffffffff, 0x5e11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000008c0), 0x8}, 0x800, 0x2, 0x3ff, 0x4, 0x5, 0xffff, 0x0, 0x0, 0x4, 0x0, 0xf19}, r2, 0x4, r0, 0x1) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0xffbffffc, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) recvmmsg$unix(r3, &(0x7f0000000780)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000000c0)=[{&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f0000000300)=""/95, 0x5f}], 0x2, &(0x7f0000000480)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f0000000500)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000580)=""/101, 0x65}], 0x1, &(0x7f0000000640)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x108}}], 0x2, 0x0, &(0x7f0000000840)={r4, r5+10000000}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r6, 0x8040942d, &(0x7f0000000880)) fallocate(r3, 0x10, 0x0, 0x87ffffc) lseek(r3, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x48) r7 = fcntl$dupfd(r1, 0x0, r1) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r7, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:15:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b34, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:15:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 10) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:15:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, 0x0, &(0x7f0000000440)) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) [ 1551.408101] FAULT_INJECTION: forcing a failure. [ 1551.408101] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.409192] CPU: 0 PID: 9144 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1551.409720] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1551.410247] Call Trace: [ 1551.410422] [ 1551.410587] dump_stack_lvl+0xc1/0xf0 [ 1551.410852] should_fail_ex+0x4b4/0x5b0 [ 1551.411130] should_failslab+0x9/0x20 [ 1551.411392] __kmem_cache_alloc_node+0x5b/0x310 [ 1551.411727] ? ext4_find_extent+0xa41/0xd30 [ 1551.412030] ? ext4_find_extent+0xa41/0xd30 [ 1551.412323] __kmalloc+0x4a/0x160 [ 1551.412564] ext4_find_extent+0xa41/0xd30 [ 1551.412856] ext4_ext_map_blocks+0x1c7/0x5970 [ 1551.413175] ? __pfx___lock_acquire+0x10/0x10 [ 1551.413490] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1551.413890] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1551.414227] ? ext4_map_blocks+0x704/0x19e0 [ 1551.414531] ? __pfx_lock_acquire+0x10/0x10 [ 1551.414824] ? __down_read_common+0x86b/0x11e0 [ 1551.415139] ? lock_acquire+0x19a/0x4c0 [ 1551.415488] ? lock_is_held_type+0x9f/0x120 [ 1551.415906] ? down_write+0x11a/0x1f0 [ 1551.416256] ? __pfx_down_write+0x10/0x10 [ 1551.416650] ext4_map_blocks+0x776/0x19e0 [ 1551.417052] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1551.417456] ? jbd2__journal_start+0xf7/0x810 [ 1551.417850] ? __ext4_journal_start_sb+0x3d7/0x560 [ 1551.418275] ? __ext4_journal_start_sb+0x1e0/0x560 [ 1551.418680] ? ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1551.419132] ? ext4_meta_trans_blocks+0x252/0x310 [ 1551.419557] ext4_alloc_file_blocks.isra.0+0x2df/0xbd0 [ 1551.420018] ? __mark_inode_dirty+0x530/0xc10 [ 1551.420414] ? __pfx_ext4_alloc_file_blocks.isra.0+0x10/0x10 [ 1551.420885] ? __mnt_drop_write_file+0x4e/0xf0 [ 1551.421284] ? __pfx_file_modified_flags+0x10/0x10 [ 1551.421703] ? up_write+0x196/0x510 [ 1551.422018] ext4_fallocate+0x1d28/0x3ad0 [ 1551.422385] ? __pfx_ext4_fallocate+0x10/0x10 [ 1551.422771] ? lock_is_held_type+0x9f/0x120 [ 1551.423140] ? __pfx_ext4_fallocate+0x10/0x10 [ 1551.423527] vfs_fallocate+0x48d/0xe30 [ 1551.423875] ioctl_preallocate+0x192/0x210 [ 1551.424230] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1551.424642] ? __pfx___lock_acquire+0x10/0x10 [ 1551.425031] ? ksys_write+0x218/0x260 [ 1551.425363] do_vfs_ioctl+0x12b3/0x1690 [ 1551.425657] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1551.425986] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1551.426400] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1551.426816] ? iget5_locked+0x198/0x210 [ 1551.427125] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1551.427555] ? __pfx_lock_release+0x10/0x10 [ 1551.427878] ? perf_trace_preemptirq_template+0x252/0x420 [ 1551.428303] ? selinux_file_ioctl+0xba/0x270 [ 1551.428631] __x64_sys_ioctl+0x110/0x210 [ 1551.428925] do_syscall_64+0x3f/0x90 [ 1551.429206] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1551.429576] RIP: 0033:0x7f560e93eb19 [ 1551.429845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1551.431102] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1551.431636] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1551.432136] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1551.432629] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1551.433120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1551.433621] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1551.434128] 21:15:01 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 9) 21:15:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b35, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:15:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 11) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:15:01 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0xff00}], 0x1, 0x7f) 21:15:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 9) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 1551.545023] FAULT_INJECTION: forcing a failure. [ 1551.545023] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.545894] CPU: 0 PID: 9162 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1551.546422] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1551.546953] Call Trace: [ 1551.547129] [ 1551.547285] dump_stack_lvl+0xc1/0xf0 [ 1551.547550] should_fail_ex+0x4b4/0x5b0 [ 1551.547843] should_failslab+0x9/0x20 [ 1551.548105] __kmem_cache_alloc_node+0x5b/0x310 [ 1551.548422] ? security_context_to_sid_core+0xaf/0x870 [ 1551.548779] ? security_context_to_sid_core+0xaf/0x870 [ 1551.549126] __kmalloc_node_track_caller+0x4b/0x160 [ 1551.549464] kmemdup_nul+0x36/0xb0 [ 1551.549720] security_context_to_sid_core+0xaf/0x870 [ 1551.550067] ? __pfx_security_context_to_sid_core+0x10/0x10 [ 1551.550441] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1551.550814] ? __fsnotify_parent+0x807/0xa60 [ 1551.551125] ? __pfx___sanitizer_cov_trace_pc+0x10/0x10 [ 1551.551484] selinux_inode_post_setxattr+0x120/0x370 [ 1551.551833] ? __pfx_selinux_inode_post_setxattr+0x10/0x10 [ 1551.552204] ? __vfs_setxattr+0x17f/0x1e0 [ 1551.552486] ? __pfx___vfs_setxattr+0x10/0x10 [ 1551.552793] security_inode_post_setxattr+0xda/0x130 [ 1551.553142] __vfs_setxattr_noperm+0x335/0x600 [ 1551.553460] __vfs_setxattr_locked+0x1d7/0x260 [ 1551.553775] ? __might_fault+0xe2/0x190 [ 1551.554075] vfs_setxattr+0x143/0x340 [ 1551.554354] ? __pfx_vfs_setxattr+0x10/0x10 [ 1551.554674] do_setxattr+0x14b/0x190 [ 1551.554951] setxattr+0x14d/0x170 [ 1551.555212] ? __pfx_setxattr+0x10/0x10 [ 1551.555500] ? __pfx___lock_acquire+0x10/0x10 [ 1551.555856] ? lock_acquire+0x19a/0x4c0 [ 1551.556145] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1551.556488] ? __pfx_lock_acquire+0x10/0x10 [ 1551.556793] ? __fget_files+0xdd/0x480 [ 1551.557097] ? lock_is_held_type+0x9f/0x120 [ 1551.557425] __x64_sys_fsetxattr+0x249/0x310 [ 1551.557742] ? syscall_enter_from_user_mode+0x21/0x50 [ 1551.558126] do_syscall_64+0x3f/0x90 [ 1551.558404] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1551.558769] RIP: 0033:0x7f0c49a80b19 [ 1551.559049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1551.560356] RSP: 002b:00007f0c46ff6188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1551.560899] RAX: ffffffffffffffda RBX: 00007f0c49b93f60 RCX: 00007f0c49a80b19 [ 1551.561401] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1551.561905] RBP: 00007f0c46ff61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1551.562426] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1551.562934] R13: 00007ffe9f9edd4f R14: 00007f0c46ff6300 R15: 0000000000022000 [ 1551.563459] [ 1551.563870] SELinux: unable to map context to SIDfor (sda, 15984), rc=12 21:15:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:15:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:15:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 12) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:15:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) [ 1551.673527] FAULT_INJECTION: forcing a failure. [ 1551.673527] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.675025] CPU: 1 PID: 9174 Comm: syz-executor.3 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1551.676028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1551.677030] Call Trace: [ 1551.677368] [ 1551.677658] dump_stack_lvl+0xc1/0xf0 [ 1551.678156] should_fail_ex+0x4b4/0x5b0 [ 1551.678683] should_failslab+0x9/0x20 [ 1551.679180] __kmem_cache_alloc_node+0x5b/0x310 [ 1551.679789] ? security_context_to_sid_core+0xaf/0x870 [ 1551.680441] ? security_context_to_sid_core+0xaf/0x870 [ 1551.681093] __kmalloc_node_track_caller+0x4b/0x160 [ 1551.681743] kmemdup_nul+0x36/0xb0 [ 1551.682233] security_context_to_sid_core+0xaf/0x870 [ 1551.682896] ? ext4_fc_mark_ineligible+0x83/0x390 [ 1551.683523] ? __pfx_security_context_to_sid_core+0x10/0x10 [ 1551.684294] ? __pfx_ext4_xattr_set+0x10/0x10 [ 1551.684901] selinux_inode_post_setxattr+0x120/0x370 [ 1551.685588] ? __pfx_selinux_inode_post_setxattr+0x10/0x10 [ 1551.685807] FAULT_INJECTION: forcing a failure. [ 1551.685807] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.686268] ? __vfs_setxattr+0x17f/0x1e0 [ 1551.686305] ? __pfx___vfs_setxattr+0x10/0x10 [ 1551.686342] security_inode_post_setxattr+0xda/0x130 [ 1551.688763] __vfs_setxattr_noperm+0x335/0x600 [ 1551.689396] __vfs_setxattr_locked+0x1d7/0x260 [ 1551.689963] ? __might_fault+0xe2/0x190 [ 1551.690530] vfs_setxattr+0x143/0x340 [ 1551.691029] ? __pfx_vfs_setxattr+0x10/0x10 [ 1551.691631] do_setxattr+0x14b/0x190 [ 1551.692113] setxattr+0x14d/0x170 [ 1551.692594] ? __pfx_setxattr+0x10/0x10 [ 1551.693093] ? __pfx___lock_acquire+0x10/0x10 [ 1551.693702] ? lock_acquire+0x19a/0x4c0 [ 1551.694213] ? lock_acquire+0x19a/0x4c0 [ 1551.694742] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1551.695337] ? __pfx_lock_acquire+0x10/0x10 [ 1551.695941] ? lock_is_held_type+0x9f/0x120 [ 1551.696517] __x64_sys_fsetxattr+0x249/0x310 [ 1551.697108] ? syscall_enter_from_user_mode+0x21/0x50 [ 1551.697775] do_syscall_64+0x3f/0x90 [ 1551.698290] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1551.698920] RIP: 0033:0x7f9994f5db19 [ 1551.699421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1551.701571] RSP: 002b:00007f99924d3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1551.702547] RAX: ffffffffffffffda RBX: 00007f9995070f60 RCX: 00007f9994f5db19 [ 1551.703411] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1551.704282] RBP: 00007f99924d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 1551.705187] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000001 [ 1551.706042] R13: 00007ffdd4c16a1f R14: 00007f99924d3300 R15: 0000000000022000 [ 1551.706928] [ 1551.707249] CPU: 0 PID: 9178 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1551.707306] SELinux: unable to map context to SIDfor (sda, 15998), rc=12 [ 1551.707836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1551.709212] Call Trace: [ 1551.709402] [ 1551.709571] dump_stack_lvl+0xc1/0xf0 [ 1551.709847] should_fail_ex+0x4b4/0x5b0 [ 1551.710139] ? ext4_mb_new_blocks+0x653/0x4460 [ 1551.710484] should_failslab+0x9/0x20 [ 1551.710760] kmem_cache_alloc+0x5a/0x390 [ 1551.711054] ? __mark_inode_dirty+0x68c/0xc10 [ 1551.711403] ext4_mb_new_blocks+0x653/0x4460 [ 1551.711744] ? __kmem_cache_alloc_node+0x1bc/0x310 [ 1551.712101] ? kasan_set_track+0x25/0x30 [ 1551.712401] ? __kasan_kmalloc+0x7f/0x90 [ 1551.712698] ? ext4_cache_extents+0x68/0x2d0 [ 1551.713025] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1551.713390] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1551.713732] ? ext4_inode_to_goal_block+0x324/0x430 [ 1551.714103] ext4_ext_map_blocks+0x1e14/0x5970 [ 1551.714443] ? __pfx___lock_acquire+0x10/0x10 [ 1551.714774] ? mark_held_locks+0x9e/0xe0 [ 1551.715085] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1551.715466] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1551.715842] ? ext4_map_blocks+0x704/0x19e0 [ 1551.716167] ? __pfx_lock_acquire+0x10/0x10 [ 1551.716476] ? __down_read_common+0x86b/0x11e0 [ 1551.716811] ? lock_acquire+0x1c7/0x4c0 [ 1551.717096] ? lock_is_held_type+0x9f/0x120 [ 1551.717426] ? __pfx_down_write+0x10/0x10 [ 1551.717726] ext4_map_blocks+0x776/0x19e0 [ 1551.718037] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1551.718375] ? jbd2__journal_start+0xf7/0x810 [ 1551.718721] ? __ext4_journal_start_sb+0x3d7/0x560 [ 1551.719077] ? __ext4_journal_start_sb+0x1e0/0x560 [ 1551.719429] ? ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1551.719817] ? ext4_meta_trans_blocks+0x252/0x310 [ 1551.720181] ext4_alloc_file_blocks.isra.0+0x2df/0xbd0 [ 1551.720559] ? __mark_inode_dirty+0x530/0xc10 [ 1551.720901] ? __pfx_ext4_alloc_file_blocks.isra.0+0x10/0x10 [ 1551.721319] ? __mnt_drop_write_file+0x4e/0xf0 [ 1551.721665] ? __pfx_file_modified_flags+0x10/0x10 [ 1551.722056] ? ext4_fallocate+0xe0b/0x3ad0 [ 1551.722370] ext4_fallocate+0x1d28/0x3ad0 [ 1551.722746] ? __pfx_ext4_fallocate+0x10/0x10 [ 1551.723163] ? vfs_fallocate+0xa2c/0xe30 [ 1551.723536] ? __pfx_ext4_fallocate+0x10/0x10 [ 1551.723973] vfs_fallocate+0x48d/0xe30 [ 1551.724346] ioctl_preallocate+0x192/0x210 [ 1551.724720] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1551.725152] ? __pfx___lock_acquire+0x10/0x10 [ 1551.725521] ? lock_acquire+0x19a/0x4c0 [ 1551.725809] do_vfs_ioctl+0x12b3/0x1690 [ 1551.726131] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1551.726441] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1551.726852] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1551.727281] ? iget5_locked+0x198/0x210 [ 1551.727580] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1551.728058] ? __pfx_lock_release+0x10/0x10 [ 1551.728366] ? perf_trace_preemptirq_template+0x252/0x420 [ 1551.728767] ? selinux_file_ioctl+0xba/0x270 [ 1551.729116] __x64_sys_ioctl+0x110/0x210 [ 1551.729410] do_syscall_64+0x3f/0x90 [ 1551.729680] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1551.730065] RIP: 0033:0x7f560e93eb19 [ 1551.730325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1551.731588] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1551.732117] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1551.732610] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1551.733108] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1551.733598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1551.734100] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1551.734601] 21:15:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b36, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:15:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 10) 21:15:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:15:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:15:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:15:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0}], 0x1, 0x7f) 21:15:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 13) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:15:14 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b37, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:15:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 10) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:15:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 11) [ 1564.205882] FAULT_INJECTION: forcing a failure. [ 1564.205882] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.206804] CPU: 1 PID: 9212 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1564.207369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.207950] Call Trace: [ 1564.207955] [ 1564.207960] dump_stack_lvl+0xc1/0xf0 21:15:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 12) [ 1564.207982] should_fail_ex+0x4b4/0x5b0 [ 1564.208005] should_failslab+0x9/0x20 [ 1564.208023] __kmem_cache_alloc_node+0x5b/0x310 [ 1564.208042] ? security_context_to_sid_core+0x754/0x870 [ 1564.208064] ? security_context_to_sid_core+0x754/0x870 21:15:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 11) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 1564.208080] __kmalloc_node_track_caller+0x4b/0x160 [ 1564.208101] kstrdup+0x3f/0x80 21:15:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) (fail_nth: 13) [ 1564.208127] security_context_to_sid_core+0x754/0x870 21:15:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 14) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) [ 1564.208143] ? ext4_fc_mark_ineligible+0x83/0x390 [ 1564.208165] ? __pfx_security_context_to_sid_core+0x10/0x10 [ 1564.208188] ? __pfx_ext4_xattr_set+0x10/0x10 [ 1564.208222] selinux_inode_post_setxattr+0x120/0x370 [ 1564.208243] ? __pfx_selinux_inode_post_setxattr+0x10/0x10 [ 1564.208262] ? __vfs_setxattr+0x17f/0x1e0 [ 1564.208281] ? __pfx___vfs_setxattr+0x10/0x10 21:15:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/800], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x42a0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) [ 1564.208300] security_inode_post_setxattr+0xda/0x130 [ 1564.208325] __vfs_setxattr_noperm+0x335/0x600 [ 1564.208347] __vfs_setxattr_locked+0x1d7/0x260 [ 1564.208363] ? __might_fault+0xe2/0x190 [ 1564.208391] vfs_setxattr+0x143/0x340 [ 1564.208411] ? __pfx_vfs_setxattr+0x10/0x10 [ 1564.208438] do_setxattr+0x14b/0x190 [ 1564.208456] setxattr+0x14d/0x170 21:15:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 15) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) [ 1564.208473] ? __pfx_setxattr+0x10/0x10 [ 1564.208489] ? __pfx___lock_acquire+0x10/0x10 [ 1564.208509] ? lock_acquire+0x19a/0x4c0 21:15:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) [ 1564.208529] ? lock_acquire+0x19a/0x4c0 [ 1564.208544] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1564.208564] ? __pfx_lock_acquire+0x10/0x10 [ 1564.208587] ? lock_is_held_type+0x9f/0x120 [ 1564.208621] __x64_sys_fsetxattr+0x249/0x310 [ 1564.208638] ? syscall_enter_from_user_mode+0x21/0x50 [ 1564.208667] do_syscall_64+0x3f/0x90 [ 1564.208684] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1564.208703] RIP: 0033:0x7f0c49a80b19 [ 1564.208715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.208730] RSP: 002b:00007f0c46ff6188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1564.208746] RAX: ffffffffffffffda RBX: 00007f0c49b93f60 RCX: 00007f0c49a80b19 [ 1564.208757] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1564.208767] RBP: 00007f0c46ff61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1564.208777] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1564.208787] R13: 00007ffe9f9edd4f R14: 00007f0c46ff6300 R15: 0000000000022000 [ 1564.208809] [ 1564.209050] SELinux: unable to map context to SIDfor (sda, 16012), rc=12 [ 1564.339757] FAULT_INJECTION: forcing a failure. [ 1564.339757] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1564.339799] CPU: 1 PID: 9228 Comm: syz-executor.2 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1564.339819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.339828] Call Trace: [ 1564.339832] [ 1564.339837] dump_stack_lvl+0xc1/0xf0 [ 1564.339860] should_fail_ex+0x4b4/0x5b0 [ 1564.339884] _copy_to_user+0x2e/0x150 [ 1564.339904] simple_read_from_buffer+0xd0/0x170 [ 1564.339932] proc_fail_nth_read+0x19c/0x230 [ 1564.339955] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1564.339979] ? security_file_permission+0xb5/0xe0 [ 1564.340009] vfs_read+0x260/0x930 [ 1564.340033] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1564.340054] ? __pfx_vfs_read+0x10/0x10 [ 1564.340076] ? lock_acquire+0x19a/0x4c0 [ 1564.340096] ? __fget_files+0x270/0x480 [ 1564.340126] ksys_read+0x12b/0x260 [ 1564.340149] ? __pfx_ksys_read+0x10/0x10 [ 1564.340175] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1564.340207] do_syscall_64+0x3f/0x90 [ 1564.340223] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1564.340242] RIP: 0033:0x7f0c49a3369c [ 1564.340254] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1564.340269] RSP: 002b:00007f0c46ff6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1564.340286] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0c49a3369c [ 1564.340296] RDX: 000000000000000f RSI: 00007f0c46ff61e0 RDI: 0000000000000006 [ 1564.340306] RBP: 00007f0c46ff61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1564.340316] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1564.340326] R13: 00007ffe9f9edd4f R14: 00007f0c46ff6300 R15: 0000000000022000 [ 1564.340348] [ 1564.341666] FAULT_INJECTION: forcing a failure. [ 1564.341666] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.341834] CPU: 1 PID: 9229 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1564.341854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.341862] Call Trace: [ 1564.341865] [ 1564.341871] dump_stack_lvl+0xc1/0xf0 [ 1564.341888] should_fail_ex+0x4b4/0x5b0 [ 1564.341908] ? ext4_mb_new_blocks+0x248e/0x4460 [ 1564.341935] should_failslab+0x9/0x20 [ 1564.341953] kmem_cache_alloc+0x5a/0x390 [ 1564.341975] ext4_mb_new_blocks+0x248e/0x4460 [ 1564.342016] ? ext4_find_extent+0x8fa/0xd30 [ 1564.342038] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 1564.342065] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1564.342085] ? ext4_inode_to_goal_block+0x324/0x430 [ 1564.342120] ext4_ext_map_blocks+0x1e14/0x5970 [ 1564.342151] ? __pfx___lock_acquire+0x10/0x10 [ 1564.342170] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1564.342199] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1564.342223] ? ext4_map_blocks+0x704/0x19e0 [ 1564.342252] ? __pfx_lock_acquire+0x10/0x10 [ 1564.342266] ? __down_read_common+0x86b/0x11e0 [ 1564.342287] ? lock_acquire+0x19a/0x4c0 [ 1564.342302] ? lock_is_held_type+0x9f/0x120 [ 1564.342338] ? __pfx_down_write+0x10/0x10 [ 1564.342362] ext4_map_blocks+0x776/0x19e0 [ 1564.342394] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1564.342420] ? jbd2__journal_start+0xf7/0x810 [ 1564.342446] ? __ext4_journal_start_sb+0x3d7/0x560 [ 1564.342463] ? __ext4_journal_start_sb+0x1e0/0x560 [ 1564.342480] ? ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1564.342500] ? ext4_meta_trans_blocks+0x252/0x310 [ 1564.342528] ext4_alloc_file_blocks.isra.0+0x2df/0xbd0 [ 1564.342550] ? __mark_inode_dirty+0x530/0xc10 [ 1564.342580] ? __pfx_ext4_alloc_file_blocks.isra.0+0x10/0x10 [ 1564.342601] ? __mnt_drop_write_file+0x4e/0xf0 [ 1564.342622] ? __pfx_file_modified_flags+0x10/0x10 [ 1564.342628] FAULT_INJECTION: forcing a failure. [ 1564.342628] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.342649] ? up_write+0x196/0x510 [ 1564.342671] ext4_fallocate+0x1d28/0x3ad0 [ 1564.342703] ? __pfx_ext4_fallocate+0x10/0x10 [ 1564.342728] ? lock_is_held_type+0x9f/0x120 [ 1564.342754] ? __pfx_ext4_fallocate+0x10/0x10 [ 1564.342777] vfs_fallocate+0x48d/0xe30 [ 1564.342814] ioctl_preallocate+0x192/0x210 [ 1564.342832] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1564.342856] ? __pfx___lock_acquire+0x10/0x10 [ 1564.342870] ? ksys_write+0x218/0x260 [ 1564.342899] do_vfs_ioctl+0x12b3/0x1690 [ 1564.342919] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1564.342939] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1564.342959] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1564.342979] ? iget5_locked+0x198/0x210 [ 1564.343004] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1564.343026] ? __pfx_lock_release+0x10/0x10 [ 1564.343046] ? perf_trace_preemptirq_template+0x252/0x420 [ 1564.343078] ? selinux_file_ioctl+0xba/0x270 [ 1564.343103] __x64_sys_ioctl+0x110/0x210 [ 1564.343124] do_syscall_64+0x3f/0x90 [ 1564.343140] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1564.343158] RIP: 0033:0x7f560e93eb19 [ 1564.343169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.343184] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1564.343199] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1564.343210] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1564.343220] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1564.343230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1564.343240] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1564.343264] [ 1564.343290] CPU: 0 PID: 9225 Comm: syz-executor.3 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1564.343325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.343341] Call Trace: [ 1564.343349] [ 1564.343359] dump_stack_lvl+0xc1/0xf0 [ 1564.343393] should_fail_ex+0x4b4/0x5b0 [ 1564.343434] should_failslab+0x9/0x20 [ 1564.343466] __kmem_cache_alloc_node+0x5b/0x310 [ 1564.343501] ? security_context_to_sid_core+0x754/0x870 [ 1564.343541] ? security_context_to_sid_core+0x754/0x870 [ 1564.343574] __kmalloc_node_track_caller+0x4b/0x160 [ 1564.343614] kstrdup+0x3f/0x80 [ 1564.343665] security_context_to_sid_core+0x754/0x870 [ 1564.343698] ? ext4_fc_mark_ineligible+0x83/0x390 [ 1564.343763] ? __pfx_security_context_to_sid_core+0x10/0x10 [ 1564.343809] ? __pfx_ext4_xattr_set+0x10/0x10 [ 1564.343875] selinux_inode_post_setxattr+0x120/0x370 [ 1564.343917] ? __pfx_selinux_inode_post_setxattr+0x10/0x10 [ 1564.343954] ? __vfs_setxattr+0x17f/0x1e0 [ 1564.343988] ? __pfx___vfs_setxattr+0x10/0x10 [ 1564.344026] security_inode_post_setxattr+0xda/0x130 [ 1564.344075] __vfs_setxattr_noperm+0x335/0x600 [ 1564.344118] __vfs_setxattr_locked+0x1d7/0x260 [ 1564.344151] ? __might_fault+0xe2/0x190 [ 1564.344200] vfs_setxattr+0x143/0x340 [ 1564.344241] ? __pfx_vfs_setxattr+0x10/0x10 [ 1564.344293] do_setxattr+0x14b/0x190 [ 1564.344331] setxattr+0x14d/0x170 [ 1564.344363] ? __pfx_setxattr+0x10/0x10 [ 1564.344395] ? __pfx___lock_acquire+0x10/0x10 [ 1564.344431] ? lock_acquire+0x19a/0x4c0 [ 1564.344472] ? lock_acquire+0x19a/0x4c0 [ 1564.344500] ? __x64_sys_fsetxattr+0x17a/0x310 [ 1564.344541] ? __pfx_lock_acquire+0x10/0x10 [ 1564.344587] ? lock_is_held_type+0x9f/0x120 [ 1564.344655] __x64_sys_fsetxattr+0x249/0x310 [ 1564.344688] ? syscall_enter_from_user_mode+0x21/0x50 [ 1564.344746] do_syscall_64+0x3f/0x90 [ 1564.344778] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1564.344813] RIP: 0033:0x7f9994f5db19 [ 1564.344835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.344864] RSP: 002b:00007f99924d3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1564.344895] RAX: ffffffffffffffda RBX: 00007f9995070f60 RCX: 00007f9994f5db19 [ 1564.344917] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000000000005 [ 1564.344937] RBP: 00007f99924d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 1564.344956] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1564.344976] R13: 00007ffdd4c16a1f R14: 00007f99924d3300 R15: 0000000000022000 [ 1564.345021] [ 1564.345731] SELinux: unable to map context to SIDfor (sda, 16014), rc=12 21:15:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:15:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 12) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:15:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x0, 0x8}], 0x1, 0x7f) 21:15:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 16) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:15:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) r5 = accept(r4, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}, {r5, 0x3341}], 0x9, 0x7f) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r6, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r8, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r8, r7, &(0x7f0000000180)=0x9, 0x0) 21:15:14 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x800}, 0x0, 0x0, 0x3e, 0x0, 0x8d8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = getpid() tkill(r2, 0x41) r3 = open(&(0x7f0000000240)='./file1\x00', 0x200800, 0x5e) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x7, 0x3, 0x2c, 0x6, 0x0, 0x1000, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4dc7, 0x2, @perf_bp={&(0x7f0000000100)}, 0x4000, 0x2, 0x6, 0x0, 0x80000000, 0x7a4e, 0x8, 0x0, 0x3, 0x0, 0x1}, r2, 0xd, r3, 0x1) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0x7e, 0x1f, 0x44, 0x2, 0x0, 0x2, 0x20005, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x5}, 0x40200, 0xb, 0x4, 0x6, 0x9, 0x0, 0xff, 0x0, 0x5, 0x0, 0x3c6}, r2, 0xffffffffffffffff, r0, 0x8) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x20, 0x81, 0x7, 0xb3, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x8004, 0x4, 0x8001, 0x0, 0xa1, 0x8, 0x3, 0x0, 0x5, 0x0, 0x19f5}, 0xffffffffffffffff, 0xc, r4, 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r5, 0x10, 0x0, 0x87ffffc) lseek(r5, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x48) r6 = fcntl$dupfd(r1, 0x0, r1) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r6, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) [ 1564.766923] FAULT_INJECTION: forcing a failure. [ 1564.766923] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.768058] CPU: 1 PID: 9248 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1564.768591] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.769152] Call Trace: [ 1564.769341] [ 1564.769512] dump_stack_lvl+0xc1/0xf0 [ 1564.769797] should_fail_ex+0x4b4/0x5b0 [ 1564.770088] ? __es_insert_extent+0x3a9/0x12f0 [ 1564.770431] should_failslab+0x9/0x20 [ 1564.770712] kmem_cache_alloc+0x5a/0x390 [ 1564.771003] __es_insert_extent+0x3a9/0x12f0 [ 1564.771326] ext4_es_insert_extent+0x2db/0xb30 [ 1564.771654] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 1564.772041] ? _raw_read_unlock+0x1e/0x40 [ 1564.772356] ? ext4_es_scan_range+0x11a/0x240 [ 1564.772692] ? __pfx_ext4_es_scan_range+0x10/0x10 [ 1564.773052] ? __pfx_down_write+0x10/0x10 [ 1564.773360] ext4_map_blocks+0xa0d/0x19e0 [ 1564.773673] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1564.773993] ? jbd2__journal_start+0xf7/0x810 [ 1564.774311] ? __ext4_journal_start_sb+0x3d7/0x560 [ 1564.774664] ? __ext4_journal_start_sb+0x1e0/0x560 [ 1564.775021] ? ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1564.775410] ? ext4_meta_trans_blocks+0x252/0x310 [ 1564.775772] ext4_alloc_file_blocks.isra.0+0x2df/0xbd0 [ 1564.776152] ? __mark_inode_dirty+0x530/0xc10 [ 1564.776489] ? __pfx_ext4_alloc_file_blocks.isra.0+0x10/0x10 [ 1564.776895] ? __mnt_drop_write_file+0x4e/0xf0 [ 1564.777236] ? __pfx_file_modified_flags+0x10/0x10 [ 1564.777605] ? up_write+0x196/0x510 [ 1564.777902] ext4_fallocate+0x1d28/0x3ad0 [ 1564.778230] ? __pfx_ext4_fallocate+0x10/0x10 [ 1564.778570] ? lock_is_held_type+0x9f/0x120 [ 1564.778908] ? __pfx_ext4_fallocate+0x10/0x10 [ 1564.779239] vfs_fallocate+0x48d/0xe30 [ 1564.779532] ioctl_preallocate+0x192/0x210 [ 1564.779847] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1564.780198] ? __pfx___lock_acquire+0x10/0x10 [ 1564.780525] ? ksys_write+0x218/0x260 [ 1564.780815] do_vfs_ioctl+0x12b3/0x1690 [ 1564.781106] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1564.781428] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1564.781840] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1564.782248] ? iget5_locked+0x198/0x210 [ 1564.782546] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1564.782960] ? __pfx_lock_release+0x10/0x10 [ 1564.783257] ? perf_trace_preemptirq_template+0x252/0x420 [ 1564.783654] ? selinux_file_ioctl+0xba/0x270 [ 1564.784039] __x64_sys_ioctl+0x110/0x210 [ 1564.784338] do_syscall_64+0x3f/0x90 [ 1564.784611] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1564.784984] RIP: 0033:0x7f560e93eb19 [ 1564.785247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.786487] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1564.787013] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1564.787506] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1564.787979] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1564.788484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1564.789002] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1564.789533] 21:15:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(0x0, 0x0, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:15:26 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:15:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 17) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:15:26 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r2, 0x10, 0x0, 0x87ffffc) lseek(r2, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="26909b126ce2af868cae38ed48a0ff000000000700060000a857000000000000d200b9ca65a481d37a3f000000bafecaddf88c11cafb39fc009bc9bf1f7a78dd050000a20000000000000000000040e6aaf842b51f0572c7a30008000000000000010000000017339d754195234c1810d6342740fec30fb235cc5b8ce2adddc4f7caccce1142f4a05a509fe3715efe36858106000000d5abf28810d4eec8a41d3aed39fff356137a629cdda0f62663630926b24c17ec21f8d5b0282087e70b30736232a002582b1112994fe73631f8caf43ff71688d470ddddb83cb89d1ba2cf16307777b56160921b5b730456d0c0fd9f5cc6e0b7846c4e6e74f381a234fad55a3ad445d8e9c43388c6f5491dfda800000000000000005850b49f8170e43c46881de46216670ee2799ef0f93a56f098d1e8b2d90ac927712645d99931c94f9f9b9503c1b522877cba518157b6cf2f96e2cbf282f34d07182fcd4e653bdb266a1c643d8efdab10a1408a26292ec10000000000015f164fc437add0ad903e4947a135bbdf7d36bc75ffa90b779a00000000000000000000000000a6ded8aeeda9320e8e1cab119722183ba452f48479248e58fb0481d0d727841300d72e672a1f1c80de668273669cceec366b75efdf5d55713c5aa8cda86b13579ab2700e1ca5521b7476c53f944006b5e5d0c77655664260feed097ab961305c4ddf98e8985b55fef537a99dc08ade4c58aebfd18e6d2adadca3b0122417cb9bd8a8d0e94202dc3383194b511a983db129f5f3313dcf0a46bea4bf23d2c0e55bde90a797f5503b38957f22d8164f05cd2c416e71bc62981674fa8bc2da93076a48e8e73293e1a7fe830e864da596a194b33c7b9589f2c98657d58fb8e8fcbe0bdb28955c863cd6b91ea7a24d5ee4d0e3738e6eba41ce70153fb6b63f3cffbc3e1129a5a9f972ccf88c68b5f14a0dcc36547240e8393c62b8ffc0aad8e4bbfb26ac5617b9cc24c85ba0c4a90407150829967a972469e3a348b122e763c85892e2273d173fa10b263f12c83d1cb905b235521c7518bdc73cb501a2e4947d4a7ff72fe8c0dec206dfe4876511975e15067fa9306e9b9f3cd41d72f5000005000000000000000000"], 0x48) fcntl$dupfd(r1, 0x0, r1) fsopen(&(0x7f0000000080)='omfs\x00', 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:15:26 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x0, 0x64}], 0x1, 0x7f) 21:15:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x21, 0x0) 21:15:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b3a, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:15:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) (fail_nth: 13) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:15:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 18) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) [ 1576.365910] FAULT_INJECTION: forcing a failure. [ 1576.365910] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1576.368799] CPU: 0 PID: 9272 Comm: syz-executor.3 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1576.369836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1576.370875] Call Trace: [ 1576.371218] [ 1576.371522] dump_stack_lvl+0xc1/0xf0 [ 1576.372058] should_fail_ex+0x4b4/0x5b0 [ 1576.372600] _copy_to_user+0x2e/0x150 [ 1576.373134] simple_read_from_buffer+0xd0/0x170 [ 1576.373786] proc_fail_nth_read+0x19c/0x230 [ 1576.374396] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1576.375066] ? security_file_permission+0xb5/0xe0 [ 1576.375745] vfs_read+0x260/0x930 [ 1576.376253] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1576.376916] ? __pfx_vfs_read+0x10/0x10 [ 1576.377462] ? __fget_files+0x270/0x480 [ 1576.378042] ksys_read+0x12b/0x260 [ 1576.378558] ? __pfx_ksys_read+0x10/0x10 [ 1576.379137] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1576.379875] do_syscall_64+0x3f/0x90 [ 1576.380418] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1576.381120] RIP: 0033:0x7f9994f1069c [ 1576.381626] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1576.383966] RSP: 002b:00007f99924d3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1576.384966] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9994f1069c [ 1576.385906] RDX: 000000000000000f RSI: 00007f99924d31e0 RDI: 0000000000000006 [ 1576.386851] RBP: 00007f99924d31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1576.387791] R10: 000000000000002b R11: 0000000000000246 R12: 0000000000000002 [ 1576.388725] R13: 00007ffdd4c16a1f R14: 00007f99924d3300 R15: 0000000000022000 [ 1576.389676] [ 1576.397753] SELinux: Context system_u:object_r:semanage_trans_ is not valid (left unmapped). [ 1576.426441] FAULT_INJECTION: forcing a failure. [ 1576.426441] name failslab, interval 1, probability 0, space 0, times 0 [ 1576.427614] CPU: 1 PID: 9283 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1576.428156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1576.428691] Call Trace: [ 1576.428867] [ 1576.429023] dump_stack_lvl+0xc1/0xf0 [ 1576.429295] should_fail_ex+0x4b4/0x5b0 [ 1576.429572] ? jbd2__journal_start+0x194/0x810 [ 1576.429892] should_failslab+0x9/0x20 [ 1576.430159] kmem_cache_alloc+0x5a/0x390 [ 1576.430438] jbd2__journal_start+0x194/0x810 [ 1576.430750] __ext4_journal_start_sb+0x3d7/0x560 [ 1576.431073] ? ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1576.431445] ? ext4_meta_trans_blocks+0x252/0x310 [ 1576.431786] ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1576.432174] ? ktime_get_coarse_real_ts64+0x15d/0x190 [ 1576.432599] ? __pfx_ext4_alloc_file_blocks.isra.0+0x10/0x10 [ 1576.432642] ? __pfx_current_time+0x10/0x10 [ 1576.432677] ext4_fallocate+0x120c/0x3ad0 [ 1576.432711] ? __pfx_ext4_fallocate+0x10/0x10 21:15:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 19) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) [ 1576.432736] ? lock_is_held_type+0x9f/0x120 [ 1576.432763] ? __pfx_ext4_fallocate+0x10/0x10 [ 1576.432786] vfs_fallocate+0x48d/0xe30 21:15:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:15:26 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x3f, 0x40, 0x9, 0x1, 0x0, 0x80000000, 0x102, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x0, @perf_config_ext={0x2, 0x62045836}, 0x128, 0x20, 0xbe81, 0x8, 0x4, 0x5, 0x0, 0x0, 0x101, 0x0, 0x100000000}, 0x0, 0x6, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x20, 0x3, 0x40, 0x6, 0x0, 0x5, 0x2a604, 0x1f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x800, 0xa396}, 0x2010, 0xfff, 0x8ba, 0x3, 0xfff, 0xc1, 0xca, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, r0, 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r2, 0x10, 0x0, 0x87ffffc) lseek(r2, 0x0, 0x3) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r3, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:15:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x7ffffffff000, 0x0) [ 1576.432818] ioctl_preallocate+0x192/0x210 [ 1576.432836] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1576.432859] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1576.432886] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1576.432913] do_vfs_ioctl+0x12b3/0x1690 [ 1576.432932] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1576.432952] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1576.432976] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1576.433000] ? __pfx_lock_release+0x10/0x10 [ 1576.433021] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 21:15:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 20) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) [ 1576.433048] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 21:15:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x21, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 1576.433071] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1576.433097] ? __x64_sys_ioctl+0xc2/0x210 [ 1576.433119] __x64_sys_ioctl+0x110/0x210 [ 1576.433140] do_syscall_64+0x3f/0x90 21:15:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x5, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x7) [ 1576.433157] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1576.433175] RIP: 0033:0x7f560e93eb19 [ 1576.433186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1576.433201] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1576.433218] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1576.433229] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1576.433239] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1576.433248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1576.433258] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1576.433281] [ 1576.645417] FAULT_INJECTION: forcing a failure. [ 1576.645417] name failslab, interval 1, probability 0, space 0, times 0 [ 1576.645543] CPU: 1 PID: 9308 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1576.645563] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1576.645572] Call Trace: [ 1576.645577] [ 1576.645584] dump_stack_lvl+0xc1/0xf0 [ 1576.645607] should_fail_ex+0x4b4/0x5b0 [ 1576.645631] should_failslab+0x9/0x20 [ 1576.645653] __kmem_cache_alloc_node+0x5b/0x310 [ 1576.645672] ? ext4_find_extent+0xa41/0xd30 [ 1576.645693] ? find_held_lock+0x2c/0x110 [ 1576.645718] ? ext4_find_extent+0xa41/0xd30 [ 1576.645738] __kmalloc+0x4a/0x160 [ 1576.645756] ext4_find_extent+0xa41/0xd30 [ 1576.645784] ext4_ext_map_blocks+0x1c7/0x5970 [ 1576.645815] ? __pfx___lock_acquire+0x10/0x10 [ 1576.645829] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1576.645854] ? __pfx___lock_acquire+0x10/0x10 [ 1576.645870] ? perf_trace_run_bpf_submit+0xf3/0x190 [ 1576.645899] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 1576.645923] ? ext4_map_blocks+0x704/0x19e0 [ 1576.645952] ? __pfx_lock_acquire+0x10/0x10 [ 1576.645967] ? lock_release+0x1e3/0x680 [ 1576.645983] ? __pfx_lock_release+0x10/0x10 [ 1576.645998] ? lock_is_held_type+0x9f/0x120 [ 1576.646033] ? down_write+0x11a/0x1f0 [ 1576.646049] ? __pfx_down_write+0x10/0x10 [ 1576.646064] ? ext4_es_lookup_extent+0xc8/0xad0 [ 1576.646096] ext4_map_blocks+0x776/0x19e0 [ 1576.646127] ? __pfx_ext4_map_blocks+0x10/0x10 [ 1576.646153] ? jbd2__journal_start+0xf7/0x810 [ 1576.646179] ? __ext4_journal_start_sb+0x3d7/0x560 [ 1576.646196] ? __ext4_journal_start_sb+0x1e0/0x560 [ 1576.646213] ? ext4_alloc_file_blocks.isra.0+0x2a2/0xbd0 [ 1576.646233] ? ext4_meta_trans_blocks+0x252/0x310 [ 1576.646261] ext4_alloc_file_blocks.isra.0+0x2df/0xbd0 [ 1576.646284] ? ktime_get_coarse_real_ts64+0x15d/0x190 [ 1576.646314] ? __pfx_ext4_alloc_file_blocks.isra.0+0x10/0x10 [ 1576.646340] ? __pfx_current_time+0x10/0x10 [ 1576.646372] ext4_fallocate+0x120c/0x3ad0 [ 1576.646404] ? __pfx_ext4_fallocate+0x10/0x10 [ 1576.646430] ? lock_is_held_type+0x9f/0x120 [ 1576.646455] ? __pfx_ext4_fallocate+0x10/0x10 [ 1576.646478] vfs_fallocate+0x48d/0xe30 [ 1576.646510] ioctl_preallocate+0x192/0x210 [ 1576.646528] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1576.646552] ? __pfx___lock_acquire+0x10/0x10 [ 1576.646566] ? ksys_write+0x218/0x260 [ 1576.646596] do_vfs_ioctl+0x12b3/0x1690 [ 1576.646615] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1576.646636] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1576.646655] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1576.646676] ? iget5_locked+0x198/0x210 [ 1576.646700] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1576.646722] ? __pfx_lock_release+0x10/0x10 [ 1576.646743] ? perf_trace_preemptirq_template+0x252/0x420 [ 1576.646772] ? selinux_file_ioctl+0xba/0x270 [ 1576.646797] __x64_sys_ioctl+0x110/0x210 [ 1576.646818] do_syscall_64+0x3f/0x90 [ 1576.646835] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1576.646854] RIP: 0033:0x7f560e93eb19 [ 1576.646866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1576.646881] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1576.646898] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1576.646909] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1576.646919] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1576.646929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1576.646939] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1576.646963] 21:15:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x7ffffffff000, 0x2) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:15:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x2) 21:15:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 21) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:15:38 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b3b, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:15:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x0, 0x5d8}], 0x1, 0x7f) 21:15:38 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{0xffffffffffffffff, 0x8}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:15:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000}, 0x0, 0x8000000000000000, 0x0, 0x0, 0x1, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x24, 0x1, 0x6, 0x3, 0x0, 0x0, {0xc}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20044810}, 0x48801) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:15:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(0x0, 0x0, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:15:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:15:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x4) 21:15:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x8) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:15:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 22) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:15:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x8) 21:15:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) fcntl$dupfd(r0, 0x0, r0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x4}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000040)={0x4}) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r4, 0x8040942d, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:15:38 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{0xffffffffffffffff, 0x8}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) [ 1588.841900] FAULT_INJECTION: forcing a failure. [ 1588.841900] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.843828] CPU: 0 PID: 9360 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1588.843862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1588.843878] Call Trace: [ 1588.843886] [ 1588.843896] dump_stack_lvl+0xc1/0xf0 [ 1588.843932] should_fail_ex+0x4b4/0x5b0 [ 1588.843977] ? jbd2__journal_start+0x194/0x810 [ 1588.844017] should_failslab+0x9/0x20 [ 1588.844049] kmem_cache_alloc+0x5a/0x390 [ 1588.844098] jbd2__journal_start+0x194/0x810 [ 1588.844145] __ext4_journal_start_sb+0x3d7/0x560 [ 1588.844179] ? ext4_fallocate+0x13b2/0x3ad0 [ 1588.844224] ext4_fallocate+0x13b2/0x3ad0 [ 1588.844283] ? __pfx_ext4_fallocate+0x10/0x10 [ 1588.844329] ? lock_is_held_type+0x9f/0x120 [ 1588.844377] ? __pfx_ext4_fallocate+0x10/0x10 [ 1588.844420] vfs_fallocate+0x48d/0xe30 [ 1588.844477] ioctl_preallocate+0x192/0x210 [ 1588.844511] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1588.844554] ? __pfx___lock_acquire+0x10/0x10 [ 1588.844582] ? ksys_write+0x218/0x260 [ 1588.844635] do_vfs_ioctl+0x12b3/0x1690 [ 1588.844671] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1588.844708] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1588.844744] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1588.844782] ? iget5_locked+0x198/0x210 [ 1588.844827] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1588.844868] ? __pfx_lock_release+0x10/0x10 [ 1588.844905] ? perf_trace_preemptirq_template+0x252/0x420 [ 1588.844957] ? selinux_file_ioctl+0xba/0x270 [ 1588.845003] __x64_sys_ioctl+0x110/0x210 [ 1588.845041] do_syscall_64+0x3f/0x90 [ 1588.845072] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1588.845106] RIP: 0033:0x7f560e93eb19 [ 1588.845127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1588.845155] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1588.845184] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1588.845204] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1588.845223] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1588.845241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1588.845259] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1588.845301] [ 1588.845445] EXT4-fs error (device sda) in ext4_zero_range:4642: Out of memory 21:15:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{0xffffffffffffffff, 0x8}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x7, 0x7f) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:15:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 23) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:15:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x10) 21:15:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b3c, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:15:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0xf) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:15:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x0, 0x6400}], 0x1, 0x7f) 21:15:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(0x0, 0x0, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:15:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r1, 0x10, 0x0, 0x87ffffc) lseek(r1, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendto$packet(r3, &(0x7f0000000080)="ce3203025c8c04318a836b3e0368", 0xe, 0x0, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@remote, @empty, r5}, 0xc) 21:15:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x10) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:16:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x4b3d, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, 0x0, &(0x7f0000000040)) 21:16:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) 21:16:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x80000001, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x10000000, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0x40305839, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000000007cd181000000000000000089"]) (fail_nth: 24) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x0) 21:16:03 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x40, 0x0, 0x1f}) r3 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r4 = openat(r3, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0x0, 0x13, r4, 0x0) accept(r4, &(0x7f00000003c0)=@l2tp, &(0x7f0000000440)=0x80) poll(&(0x7f0000000480)=[{r4}, {0xffffffffffffffff, 0x8}, {r3, 0x802}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r1, 0x8000}, {0xffffffffffffffff, 0x30}], 0x8, 0x7f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) openat(r5, &(0x7f0000000140)='./file0/file0\x00', 0x20000, 0x0) getpeername$unix(r2, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, 0x0, &(0x7f0000000040)) sendfile(r7, r6, &(0x7f0000000180)=0x9, 0x0) 21:16:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x15) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) 21:16:03 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x800, 0x0) fallocate(r2, 0x10, 0x0, 0x87ffffc) lseek(r2, 0x0, 0x3) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x48) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000300)=@kern={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340), 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="1c0087f6000300000000000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0xd0, 0xc000}, 0x200040a0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x4, 0xce, [0x8, 0x8000, 0x2, 0x9, 0x2, 0x9], 0x0, &(0x7f0000000080), &(0x7f0000000700)=""/206}, &(0x7f00000000c0)=0x78) fcntl$dupfd(r1, 0x0, r1) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000000040)={0x4}) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r5, 0x8040942d, &(0x7f0000000380)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x79, 0xfd, 0x3, 0x2, 0x0, 0x0, 0x220, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_config_ext={0x45, 0x7}, 0x4500, 0x8, 0x80, 0x1, 0xe0, 0x3, 0x2000, 0x0, 0x20, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x6) 21:16:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x0, 0xd805}], 0x1, 0x7f) 21:16:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0xf0) [ 1613.520992] FAULT_INJECTION: forcing a failure. [ 1613.520992] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1613.522329] CPU: 0 PID: 9418 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1613.522927] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1613.523530] Call Trace: [ 1613.523731] [ 1613.523911] dump_stack_lvl+0xc1/0xf0 [ 1613.524208] should_fail_ex+0x4b4/0x5b0 [ 1613.524519] prepare_alloc_pages+0x178/0x500 [ 1613.524861] __alloc_pages+0x149/0x480 [ 1613.525157] ? lock_acquire+0x19a/0x4c0 [ 1613.525465] ? __pfx___alloc_pages+0x10/0x10 [ 1613.525808] ? lock_release+0x1e3/0x680 [ 1613.526120] ? xas_start+0x14e/0x710 [ 1613.526419] alloc_pages+0x1a0/0x260 [ 1613.526708] filemap_alloc_folio+0x374/0x410 [ 1613.527058] ? __pfx_filemap_alloc_folio+0x10/0x10 [ 1613.527431] ? ext4_reserve_inode_write+0x11c/0x280 [ 1613.527812] __filemap_get_folio+0x285/0x8d0 [ 1613.528163] __ext4_block_zero_page_range+0x9d/0x710 [ 1613.528576] ext4_zero_partial_blocks+0x29d/0x4a0 [ 1613.528951] ext4_fallocate+0x14bd/0x3ad0 [ 1613.529291] ? __pfx_ext4_fallocate+0x10/0x10 [ 1613.529653] ? lock_is_held_type+0x9f/0x120 [ 1613.529990] ? __pfx_ext4_fallocate+0x10/0x10 [ 1613.530351] vfs_fallocate+0x48d/0xe30 [ 1613.530677] ioctl_preallocate+0x192/0x210 [ 1613.530996] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1613.531363] ? __pfx___lock_acquire+0x10/0x10 [ 1613.531695] ? ksys_write+0x218/0x260 [ 1613.531996] do_vfs_ioctl+0x12b3/0x1690 [ 1613.532298] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1613.532655] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1613.533082] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1613.533521] ? iget5_locked+0x198/0x210 [ 1613.533835] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1613.534290] ? __pfx_lock_release+0x10/0x10 [ 1613.534618] ? perf_trace_preemptirq_template+0x252/0x420 [ 1613.535038] ? selinux_file_ioctl+0xba/0x270 [ 1613.535372] __x64_sys_ioctl+0x110/0x210 [ 1613.535679] do_syscall_64+0x3f/0x90 [ 1613.535964] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1613.536357] RIP: 0033:0x7f560e93eb19 [ 1613.536642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1613.537942] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1613.538478] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1613.538985] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1613.539492] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1613.539998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1613.540508] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1613.541030] [ 1613.541846] general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 1613.542636] KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [ 1613.543231] CPU: 0 PID: 9418 Comm: syz-executor.1 Not tainted 6.3.0-rc6-next-20230413 #1 [ 1613.543974] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1613.544580] RIP: 0010:__ext4_block_zero_page_range+0x14f/0x710 [ 1613.545026] Code: 7f 08 84 c0 0f 85 fe 04 00 00 4d 8d 45 28 b9 0c 00 00 00 48 b8 00 00 00 00 00 fc ff df 2a 4d 14 4c 89 c2 48 d3 e3 48 c1 ea 03 <80> 3c 02 00 0f 85 0a 05 00 00 49 8b 6d 28 48 85 ed 0f 84 71 04 00 [ 1613.546351] RSP: 0018:ffff8880447d7a08 EFLAGS: 00010217 [ 1613.546744] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1613.547273] RDX: 0000000000000003 RSI: ffffffff81b2f08e RDI: ffff888009ce4014 [ 1613.547794] RBP: ffff888009ce4000 R08: 000000000000001c R09: ffffffff856c1213 [ 1613.548319] R10: fffffbfff0ad8242 R11: 0000000000000001 R12: 0000000000000081 [ 1613.548848] R13: fffffffffffffff4 R14: 0000000000001000 R15: 0000000000001000 [ 1613.553183] FS: 00007f560beb4700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1613.554513] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1613.555503] CR2: 00007f6205b1cd58 CR3: 000000000d52a000 CR4: 0000000000350ef0 [ 1613.556685] Call Trace: [ 1613.557049] [ 1613.557381] ext4_zero_partial_blocks+0x29d/0x4a0 [ 1613.558074] ext4_fallocate+0x14bd/0x3ad0 [ 1613.558682] ? __pfx_ext4_fallocate+0x10/0x10 [ 1613.559280] ? lock_is_held_type+0x9f/0x120 [ 1613.559877] ? __pfx_ext4_fallocate+0x10/0x10 [ 1613.560543] vfs_fallocate+0x48d/0xe30 [ 1613.561084] ioctl_preallocate+0x192/0x210 [ 1613.561653] ? __pfx_ioctl_preallocate+0x10/0x10 [ 1613.562279] ? __pfx___lock_acquire+0x10/0x10 [ 1613.562857] ? ksys_write+0x218/0x260 [ 1613.563374] do_vfs_ioctl+0x12b3/0x1690 [ 1613.563893] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1613.564464] ? ioctl_has_perm.constprop.0.isra.0+0x28c/0x420 [ 1613.565217] ? ioctl_has_perm.constprop.0.isra.0+0x295/0x420 [ 1613.565973] ? iget5_locked+0x198/0x210 [ 1613.566514] ? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10 [ 1613.567297] ? __pfx_lock_release+0x10/0x10 [ 1613.567850] ? perf_trace_preemptirq_template+0x252/0x420 [ 1613.568583] ? selinux_file_ioctl+0xba/0x270 [ 1613.569147] __x64_sys_ioctl+0x110/0x210 [ 1613.569667] do_syscall_64+0x3f/0x90 [ 1613.570141] entry_SYSCALL_64_after_hwframe+0x72/0xdc 21:16:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x80000) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000340)) [ 1613.570791] RIP: 0033:0x7f560e93eb19 21:16:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x4}) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) r2 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp, 0x0) poll(&(0x7f0000000480)=[{}, {0xffffffffffffffff, 0x8}, {r1}, {0xffffffffffffffff, 0x349d}, {0xffffffffffffffff, 0x48}, {}, {r0, 0x8000}, {r2, 0x3341}], 0x8, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xdd4ffb622d857ead, 0x0) [ 1613.570812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1613.570839] RSP: 002b:00007f560beb4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1613.570866] RAX: ffffffffffffffda RBX: 00007f560ea51f60 RCX: 00007f560e93eb19 [ 1613.570885] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1613.570903] RBP: 00007f560beb41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1613.570921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 21:16:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0x40305839, &(0x7f0000000080)=ANY=[]) pwrite64(r0, 0x0, 0x0, 0x1000) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140), &(0x7f0000000180)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b, 0x321) [ 1613.570938] R13: 00007ffdd2e1686f R14: 00007f560beb4300 R15: 0000000000022000 [ 1613.570966] [ 1613.570973] Modules linked in: [ 1613.571599] ---[ end trace 0000000000000000 ]--- [ 1613.571617] RIP: 0010:__ext4_block_zero_page_range+0x14f/0x710 [ 1613.571676] Code: 7f 08 84 c0 0f 85 fe 04 00 00 4d 8d 45 28 b9 0c 00 00 00 48 b8 00 00 00 00 00 fc ff df 2a 4d 14 4c 89 c2 48 d3 e3 48 c1 ea 03 <80> 3c 02 00 0f 85 0a 05 00 00 49 8b 6d 28 48 85 ed 0f 84 71 04 00 [ 1613.571705] RSP: 0018:ffff8880447d7a08 EFLAGS: 00010217 [ 1613.571732] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1613.571752] RDX: 0000000000000003 RSI: ffffffff81b2f08e RDI: ffff888009ce4014 [ 1613.571773] RBP: ffff888009ce4000 R08: 000000000000001c R09: ffffffff856c1213 [ 1613.571794] R10: fffffbfff0ad8242 R11: 0000000000000001 R12: 0000000000000081 [ 1613.571814] R13: fffffffffffffff4 R14: 0000000000001000 R15: 0000000000001000 [ 1613.571837] FS: 00007f560beb4700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1613.571865] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1613.571889] CR2: 00007f6205b1cd58 CR3: 000000000d52a000 CR4: 0000000000350ef0 21:16:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) poll(&(0x7f0000000480)=[{r0, 0x0, 0xff00}], 0x1, 0x7f) VM DIAGNOSIS: 21:16:03 Registers: info registers vcpu 0 RAX=0000000000000066 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff824fc9e5 RDI=ffffffff87f16c00 RBP=ffffffff87f16bc0 RSP=ffff8880447d73f8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000066 R11=0000000000000001 R12=0000000000000066 R13=ffffffff87f16bc0 R14=0000000000000010 R15=ffffffff824fc9d0 RIP=ffffffff824fca3d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f560beb4700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f6205b1cd58 CR3=000000000d52a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000001 RBX=0000000000000001 RCX=ffffffff812d5c6a RDX=fffffbfff0ba509b RSI=0000000000000008 RDI=ffffffff85d284d0 RBP=1ffff1100d9e13bc RSP=ffff88806cf09dd0 R8 =0000000000000000 R9 =ffffffff85d284d7 R10=fffffbfff0ba509a R11=0000000000000001 R12=ffffffff8562b508 R13=ffffffff813efbdf R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff812d5c6a RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007efd83a45700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2c024000 CR3=000000004220c000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffffffffffffff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000