Warning: Permanently added '[localhost]:61241' (ECDSA) to the list of known hosts. 2022/10/31 10:52:31 fuzzer started 2022/10/31 10:52:31 dialing manager at localhost:40945 2022/10/31 10:52:31 checking machine... 2022/10/31 10:52:31 checking revisions... syzkaller login: [ 35.682965] kmemleak: Automatic memory scanning thread ended 2022/10/31 10:52:31 testing simple program... [ 35.759961] cgroup: Unknown subsys name 'net' [ 35.855077] cgroup: Unknown subsys name 'rlimit' executing program executing program executing program executing program [ 49.043352] audit: type=1400 audit(1667213565.036:6): avc: denied { execmem } for pid=283 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 50.165596] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 50.166919] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 50.169324] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 50.172459] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 50.173735] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 50.174813] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 50.181508] Bluetooth: hci0: HCI_REQ-0x0c1a executing program [ 52.246483] Bluetooth: hci0: command 0x0409 tx timeout executing program [ 54.293842] Bluetooth: hci0: command 0x041b tx timeout [ 56.341858] Bluetooth: hci0: command 0x040f tx timeout executing program [ 58.389982] Bluetooth: hci0: command 0x0419 tx timeout executing program executing program executing program executing program [ 69.942406] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.943549] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.946043] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 69.966632] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.967959] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.969889] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 2022/10/31 10:53:06 building call list... executing program [ 73.043215] audit: type=1400 audit(1667213589.036:7): avc: denied { create } for pid=263 comm="syz-fuzzer" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 executing program 2022/10/31 10:53:12 syscalls: 2217 2022/10/31 10:53:12 code coverage: enabled 2022/10/31 10:53:12 comparison tracing: enabled 2022/10/31 10:53:12 extra coverage: enabled 2022/10/31 10:53:12 setuid sandbox: enabled 2022/10/31 10:53:12 namespace sandbox: enabled 2022/10/31 10:53:12 Android sandbox: enabled 2022/10/31 10:53:12 fault injection: enabled 2022/10/31 10:53:12 leak checking: enabled 2022/10/31 10:53:12 net packet injection: enabled 2022/10/31 10:53:12 net device setup: enabled 2022/10/31 10:53:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/10/31 10:53:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/10/31 10:53:12 USB emulation: enabled 2022/10/31 10:53:12 hci packet injection: enabled 2022/10/31 10:53:12 wifi device emulation: enabled 2022/10/31 10:53:12 802.15.4 emulation: enabled 2022/10/31 10:53:12 fetching corpus: 0, signal 0/0 (executing program) 2022/10/31 10:53:12 fetching corpus: 0, signal 0/0 (executing program) 2022/10/31 10:53:14 starting 8 fuzzer processes 10:53:14 executing program 0: munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 10:53:14 executing program 1: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:53:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:53:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 10:53:14 executing program 5: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:53:14 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:53:14 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:53:14 executing program 7: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) [ 79.846394] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 79.849904] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 79.853126] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 79.860436] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 79.862658] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 79.868047] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 79.872738] Bluetooth: hci0: HCI_REQ-0x0c1a [ 79.912415] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 79.915734] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 79.918171] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 79.922054] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 79.923710] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 79.935007] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 79.941667] Bluetooth: hci1: HCI_REQ-0x0c1a [ 79.987478] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 79.991135] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 79.992556] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 79.993029] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 79.996049] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 79.997454] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 79.998446] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 79.999391] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 80.001013] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 80.001123] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 80.006318] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 80.008926] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 80.010478] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 80.017246] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 80.018380] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 80.021901] Bluetooth: hci7: HCI_REQ-0x0c1a [ 80.024254] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 80.025358] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 80.047880] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 80.050349] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 80.051260] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 80.056867] Bluetooth: hci5: HCI_REQ-0x0c1a [ 80.057714] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 80.057728] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 80.061289] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 80.062389] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 80.064789] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 80.068172] Bluetooth: hci4: HCI_REQ-0x0c1a [ 80.075361] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 80.079335] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 80.084386] Bluetooth: hci3: HCI_REQ-0x0c1a [ 80.116059] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 80.124401] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 80.132742] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 80.157839] Bluetooth: hci6: HCI_REQ-0x0c1a [ 81.941877] Bluetooth: hci0: command 0x0409 tx timeout [ 81.941893] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 82.006863] Bluetooth: hci1: command 0x0409 tx timeout [ 82.069843] Bluetooth: hci5: command 0x0409 tx timeout [ 82.070834] Bluetooth: hci7: command 0x0409 tx timeout [ 82.134979] Bluetooth: hci3: command 0x0409 tx timeout [ 82.135641] Bluetooth: hci4: command 0x0409 tx timeout [ 82.197840] Bluetooth: hci6: command 0x0409 tx timeout [ 83.989855] Bluetooth: hci0: command 0x041b tx timeout [ 84.053833] Bluetooth: hci1: command 0x041b tx timeout [ 84.117916] Bluetooth: hci7: command 0x041b tx timeout [ 84.118402] Bluetooth: hci5: command 0x041b tx timeout [ 84.181838] Bluetooth: hci4: command 0x041b tx timeout [ 84.182241] Bluetooth: hci3: command 0x041b tx timeout [ 84.245869] Bluetooth: hci6: command 0x041b tx timeout [ 86.037844] Bluetooth: hci0: command 0x040f tx timeout [ 86.101832] Bluetooth: hci1: command 0x040f tx timeout [ 86.165883] Bluetooth: hci5: command 0x040f tx timeout [ 86.165901] Bluetooth: hci7: command 0x040f tx timeout [ 86.229858] Bluetooth: hci3: command 0x040f tx timeout [ 86.229884] Bluetooth: hci4: command 0x040f tx timeout [ 86.293850] Bluetooth: hci6: command 0x040f tx timeout [ 86.487107] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 88.085851] Bluetooth: hci0: command 0x0419 tx timeout [ 88.150023] Bluetooth: hci1: command 0x0419 tx timeout [ 88.215066] Bluetooth: hci7: command 0x0419 tx timeout [ 88.215684] Bluetooth: hci5: command 0x0419 tx timeout [ 88.277851] Bluetooth: hci3: command 0x0419 tx timeout [ 88.278461] Bluetooth: hci4: command 0x0419 tx timeout [ 88.341963] Bluetooth: hci6: command 0x0419 tx timeout [ 88.883005] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 88.894056] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 88.895834] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 88.901976] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 88.907185] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 88.910234] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 88.917188] Bluetooth: hci2: HCI_REQ-0x0c1a [ 90.965960] Bluetooth: hci2: command 0x0409 tx timeout [ 93.013871] Bluetooth: hci2: command 0x041b tx timeout [ 95.062920] Bluetooth: hci2: command 0x040f tx timeout [ 97.109942] Bluetooth: hci2: command 0x0419 tx timeout [ 131.481325] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.482107] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.483352] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 131.722906] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.723516] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.725112] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 131.775010] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.775637] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.777100] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 131.956511] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 131.957137] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 131.958547] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 132.390919] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 132.391543] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 132.393119] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 132.519151] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 132.519791] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 132.522195] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 132.688196] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 132.689093] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 132.690293] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 132.856291] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 132.856960] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 132.859142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 133.440641] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 133.441325] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 133.442642] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 133.524509] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 133.525484] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 133.526719] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 133.579147] audit: type=1400 audit(1667213649.571:8): avc: denied { open } for pid=4391 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 133.580610] audit: type=1400 audit(1667213649.572:9): avc: denied { kernel } for pid=4391 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 134.215650] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 134.216309] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.217729] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 134.250557] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 134.251199] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.252620] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 134.276188] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 134.276890] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.278703] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 134.303309] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 134.304027] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.305297] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 134.674769] hrtimer: interrupt took 19557 ns [ 136.324813] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 136.325958] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 136.328292] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 136.362404] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 136.363677] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 136.366398] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 137.377127] random: crng reseeded on system resumption [ 137.709654] random: crng reseeded on system resumption 10:54:13 executing program 0: munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 10:54:13 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:54:13 executing program 7: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) 10:54:13 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 10:54:13 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:13 executing program 5: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:13 executing program 1: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:14 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 10:54:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:54:14 executing program 0: munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 138.151544] random: crng reseeded on system resumption 10:54:14 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:14 executing program 5: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 10:54:14 executing program 7: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) 10:54:14 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:14 executing program 0: munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 10:54:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:54:14 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:14 executing program 3: munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 10:54:14 executing program 5: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:14 executing program 1: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:14 executing program 7: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) 10:54:14 executing program 3: munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 139.121504] random: crng reseeded on system resumption 10:54:15 executing program 3: munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 10:54:15 executing program 2: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 4: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 5: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 6: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 0: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 1: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 7: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) [ 139.351717] random: crng reseeded on system resumption 10:54:15 executing program 7: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) [ 139.556704] random: crng reseeded on system resumption 10:54:15 executing program 5: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 4: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 1: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 3: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 6: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) [ 139.746481] random: crng reseeded on system resumption 10:54:15 executing program 2: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:15 executing program 0: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) [ 139.933293] random: crng reseeded on system resumption 10:54:15 executing program 4: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:16 executing program 1: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) [ 140.119340] random: crng reseeded on system resumption 10:54:16 executing program 6: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:16 executing program 2: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) [ 140.386720] random: crng reseeded on system resumption 10:54:16 executing program 0: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:16 executing program 6: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:16 executing program 3: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:16 executing program 5: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:16 executing program 1: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:16 executing program 7: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:16 executing program 4: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:16 executing program 2: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) [ 140.965856] random: crng reseeded on system resumption 10:54:17 executing program 3: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:17 executing program 2: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:17 executing program 5: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:17 executing program 0: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:17 executing program 3: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) [ 141.958927] random: crng reseeded on system resumption 10:54:18 executing program 0: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:18 executing program 6: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:18 executing program 5: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:18 executing program 3: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:18 executing program 4: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:18 executing program 2: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:18 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) [ 142.161427] random: crng reseeded on system resumption 10:54:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 10:54:18 executing program 5: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:18 executing program 3: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:18 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:18 executing program 0: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 10:54:18 executing program 4: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:18 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:18 executing program 6: r0 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_CHECKPOINT(0xffffffffffffffff, 0x4004662b, &(0x7f0000000040)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps_rollup\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r1, &(0x7f0000000140)='/dev/loop-control\x00', 0x3) r3 = openat2(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0xb) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x78, 0x81, 0x7f, 0x9, 0x0, 0x20, 0xc91f449b0dc1cbe8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x44000, 0x2, 0x9, 0x7, 0xf8, 0x7, 0xfff, 0x0, 0x7, 0x0, 0x1000}, 0x0, 0xe, 0xffffffffffffffff, 0x3) 10:54:18 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:18 executing program 7: r0 = open$dir(&(0x7f0000000200)='.\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getdents64(r0, &(0x7f00000000c0)=""/120, 0x78) 10:54:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 10:54:18 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) [ 142.442153] random: crng reseeded on system resumption 10:54:18 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:18 executing program 4: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:54:18 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:54:18 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:18 executing program 7: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:54:18 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:18 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:18 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_io_uring_setup(0x4d37, &(0x7f0000000b00), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x408) 10:54:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:54:18 executing program 7: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 4: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 2: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:54:18 executing program 6: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) 10:54:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 10:54:18 executing program 7: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 2: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 4: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:18 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) 10:54:19 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x2, @long}, 0x14) 10:54:19 executing program 2: r0 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r2 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000040)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x2, 0x0}, 0x0) syz_io_uring_setup(0x7ccc, &(0x7f0000000200), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000000280), 0x0) io_uring_enter(r2, 0x58e4, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:19 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x2, @long}, 0x14) 10:54:19 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) 10:54:19 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) 10:54:19 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x2, @long}, 0x14) 10:54:19 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x2, @long}, 0x14) 10:54:19 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x3}) 10:54:19 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) 10:54:19 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x3}) 10:54:19 executing program 5: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x2, @long}, 0x14) 10:54:19 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x2, @long}, 0x14) 10:54:19 executing program 7: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x3}) 10:54:19 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) 10:54:19 executing program 7: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x3}) 10:54:19 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x3}) 10:54:19 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) 10:54:19 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000001900), 0x9, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001940), 0xffffffffffffffff) 10:54:19 executing program 6: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r0, &(0x7f0000000000)={0x2, @long}, 0x14) 10:54:19 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) 10:54:19 executing program 2: process_vm_readv(0x0, &(0x7f0000001340)=[{&(0x7f0000000040)=""/253, 0xfd}, {0x0}], 0x2, &(0x7f0000001580)=[{0x0}, {0x0}], 0x2, 0x0) 10:54:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:19 executing program 7: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x3}) 10:54:20 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x3}) 10:54:20 executing program 2: process_vm_readv(0x0, &(0x7f0000001340)=[{&(0x7f0000000040)=""/253, 0xfd}, {0x0}], 0x2, &(0x7f0000001580)=[{0x0}, {0x0}], 0x2, 0x0) 10:54:20 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) 10:54:20 executing program 2: process_vm_readv(0x0, &(0x7f0000001340)=[{&(0x7f0000000040)=""/253, 0xfd}, {0x0}], 0x2, &(0x7f0000001580)=[{0x0}, {0x0}], 0x2, 0x0) 10:54:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 2: process_vm_readv(0x0, &(0x7f0000001340)=[{&(0x7f0000000040)=""/253, 0xfd}, {0x0}], 0x2, &(0x7f0000001580)=[{0x0}, {0x0}], 0x2, 0x0) 10:54:20 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 0: r0 = fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x9, 0x0, 0x0, 0x0) 10:54:20 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 0: r0 = fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x9, 0x0, 0x0, 0x0) 10:54:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:20 executing program 2: r0 = fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x9, 0x0, 0x0, 0x0) 10:54:20 executing program 0: r0 = fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x9, 0x0, 0x0, 0x0) 10:54:20 executing program 2: r0 = fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x9, 0x0, 0x0, 0x0) 10:54:20 executing program 5: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:21 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) shutdown(r0, 0x0) 10:54:21 executing program 0: r0 = fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x9, 0x0, 0x0, 0x0) 10:54:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600)=0x3, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) clone3(&(0x7f00000001c0)={0xa1326900, &(0x7f0000000180), 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) fork() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000007c0)={0x0, 0x0}) syz_open_procfs$namespace(r2, &(0x7f0000000840)='ns/time\x00') 10:54:21 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) shutdown(r0, 0x0) 10:54:21 executing program 5: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 2: r0 = fsopen(&(0x7f0000000040)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x9, 0x0, 0x0, 0x0) 10:54:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) shutdown(r0, 0x0) 10:54:21 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) shutdown(r0, 0x0) 10:54:21 executing program 4: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 3: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2482) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 10:54:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) shutdown(r0, 0x0) 10:54:21 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) shutdown(r0, 0x0) 10:54:21 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2482) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 10:54:21 executing program 5: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2482) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 10:54:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) shutdown(r0, 0x0) 10:54:21 executing program 4: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 3: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 3: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 6: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 4: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 5: perf_event_open(&(0x7f0000003700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2482) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 10:54:21 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2482) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 10:54:21 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2482) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 10:54:21 executing program 6: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x2482) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 10:54:21 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:21 executing program 6: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = memfd_create(&(0x7f0000000300)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xee\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba', 0x0) pwritev2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:54:21 executing program 3: truncate(0x0, 0xfffffffffffffffc) 10:54:21 executing program 1: r0 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x7002, 0x0) 10:54:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 10:54:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/248, 0xf8) 10:54:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:21 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/248, 0xf8) 10:54:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 10:54:22 executing program 1: r0 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x7002, 0x0) 10:54:22 executing program 3: truncate(0x0, 0xfffffffffffffffc) 10:54:22 executing program 6: r0 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x7002, 0x0) 10:54:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 10:54:22 executing program 1: r0 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x7002, 0x0) 10:54:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/248, 0xf8) 10:54:22 executing program 6: r0 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x7002, 0x0) 10:54:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:22 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:22 executing program 3: truncate(0x0, 0xfffffffffffffffc) 10:54:22 executing program 3: truncate(0x0, 0xfffffffffffffffc) 10:54:22 executing program 6: r0 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x7002, 0x0) 10:54:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 10:54:22 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:22 executing program 1: r0 = syz_open_dev$rtc(&(0x7f00000007c0), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x7002, 0x0) 10:54:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/248, 0xf8) 10:54:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:22 executing program 6: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:22 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:22 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/248, 0xf8) 10:54:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:25 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:25 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:25 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/248, 0xf8) 10:54:25 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:25 executing program 6: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/248, 0xf8) 10:54:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x4}, @ETHTOOL_A_COALESCE_RX_USECS_HIGH={0x8}]}, 0x2c}}, 0x0) 10:54:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:27 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:27 executing program 6: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:27 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:27 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:27 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001280)) epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000400)={0x30000004}) dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x10001, @mcast1, 0x11}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 10:54:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:27 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:27 executing program 1: syz_io_uring_setup(0x42f4, &(0x7f0000000100), &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff3000/0x4000)=nil, 0x0, 0x0) madvise(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x18) 10:54:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:29 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:29 executing program 1: syz_io_uring_setup(0x42f4, &(0x7f0000000100), &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff3000/0x4000)=nil, 0x0, 0x0) madvise(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x18) 10:54:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 10:54:29 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:29 executing program 6: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r0, 0x0, 0x0, 0x9) 10:54:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 10:54:29 executing program 3: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 153.872098] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 153.891869] loop7: detected capacity change from 0 to 264192 [ 153.899058] ======================================================= [ 153.899058] WARNING: The mand mount option has been deprecated and [ 153.899058] and is ignored by this kernel. Remove the mand [ 153.899058] option from the mount to silence this warning. [ 153.899058] ======================================================= [ 153.911319] ext2: Unknown parameter 'dont_hash' [ 153.943580] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 153.950161] loop7: detected capacity change from 0 to 264192 10:54:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) [ 153.957062] ext2: Unknown parameter 'dont_hash' 10:54:29 executing program 6: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r0, 0x0, 0x0, 0x9) 10:54:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:30 executing program 1: syz_io_uring_setup(0x42f4, &(0x7f0000000100), &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff3000/0x4000)=nil, 0x0, 0x0) madvise(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x18) 10:54:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 10:54:30 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:30 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 3: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 154.172462] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 154.184624] loop7: detected capacity change from 0 to 264192 [ 154.185460] ext2: Unknown parameter 'dont_hash' 10:54:30 executing program 6: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r0, 0x0, 0x0, 0x9) 10:54:30 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 10:54:30 executing program 1: syz_io_uring_setup(0x42f4, &(0x7f0000000100), &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff3000/0x4000)=nil, 0x0, 0x0) madvise(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x18) 10:54:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:30 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 3: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:30 executing program 6: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r0, 0x0, 0x0, 0x9) [ 154.476166] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 154.485701] loop7: detected capacity change from 0 to 264192 [ 154.488145] ext2: Unknown parameter 'dont_hash' 10:54:30 executing program 3: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:30 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 6: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:30 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:30 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) [ 154.725021] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 154.727731] loop7: detected capacity change from 0 to 264192 [ 154.732114] ext2: Unknown parameter 'dont_hash' 10:54:30 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:30 executing program 6: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:30 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 7: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) [ 154.879183] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 154.894701] loop5: detected capacity change from 0 to 264192 [ 154.907485] ext2: Unknown parameter 'dont_hash' 10:54:30 executing program 6: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:30 executing program 7: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 2: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/118, 0x76}], 0x10000000000000ce, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:30 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 7: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 155.126731] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.130140] loop5: detected capacity change from 0 to 264192 10:54:31 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 155.138077] ext2: Unknown parameter 'dont_hash' [ 155.338316] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.339961] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.343558] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.348416] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.348777] loop5: detected capacity change from 0 to 264192 [ 155.351061] loop2: detected capacity change from 0 to 264192 [ 155.353624] loop4: detected capacity change from 0 to 264192 [ 155.354376] ext2: Unknown parameter 'dont_hash' [ 155.356421] loop6: detected capacity change from 0 to 264192 [ 155.357171] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.358117] ext2: Unknown parameter 'dont_hash' [ 155.358886] ext2: Unknown parameter 'dont_hash' [ 155.359619] ext2: Unknown parameter 'dont_hash' [ 155.363513] loop7: detected capacity change from 0 to 264192 [ 155.364454] ext2: Unknown parameter 'dont_hash' 10:54:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, 0x0, 0x0, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xc29480, 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) 10:54:31 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) [ 155.472187] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.477543] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 10:54:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) [ 155.484049] loop6: detected capacity change from 0 to 264192 [ 155.484844] ext2: Unknown parameter 'dont_hash' [ 155.485367] loop2: detected capacity change from 0 to 264192 [ 155.486158] ext2: Unknown parameter 'dont_hash' 10:54:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) [ 155.497710] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.505286] loop7: detected capacity change from 0 to 264192 [ 155.508398] ext2: Unknown parameter 'dont_hash' [ 155.538014] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.545445] loop4: detected capacity change from 0 to 264192 [ 155.550081] ext2: Unknown parameter 'dont_hash' 10:54:31 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) [ 155.603143] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.610881] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.615408] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.617070] loop6: detected capacity change from 0 to 264192 [ 155.618019] ext2: Unknown parameter 'dont_hash' [ 155.627714] loop2: detected capacity change from 0 to 264192 [ 155.629182] loop7: detected capacity change from 0 to 264192 [ 155.631536] ext2: Unknown parameter 'dont_hash' [ 155.634656] ext2: Unknown parameter 'dont_hash' 10:54:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000940)={'trans=unix,', {[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r0 = signalfd(0xffffffffffffffff, &(0x7f00000007c0), 0x8) syz_io_uring_setup(0x0, &(0x7f0000000700)={0x0, 0x573c, 0x4, 0x2, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffff8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="9cbfe56008ff70e559f2fde7f0547f9f54a4b4b0fa8ec4e14bba5d7d4ebd33e1c54291bb8bd547e82bb0857098106168b6a1e12dee739b3ff57b1914be00b4628b2a6047884dedcdc8bf06221718640ae8858302d97e340c326238792e3accf073d66db72c0ecc1fc57fa992365cf8b7d37038a4dca4daf8bbebee6a9d843c1ca2eb3299867e235b376d5dcecae2d3db950fe7fffab06311e8a5d03de1f342fbf9de7b1fa264a8e0c61b764d2899f0ecf74bff2478c4a61b07b4b7755acc551b17328caa4339176733d0f88f319db375c93a0507b19cde0d7625411bffec1d02e5b799003917670530e6aeeba6ab3f", 0xef, 0x8001}, {&(0x7f0000000280)="914179de310be44bb4b8e91432542a15102098d67534294a6c1eda4ff97241e1cc3eef41bcfbd63480df1b357e2330e6bccc4f4428374808bffc5ccec012a15c14af4a529faffb36ef798b02bbdd980571689e575c1398a994ac7d5689e18493147c79dcf7b87078c63499d6c0bd58defd029fccf459ee036ab266f961091fb5a9528440d9171e18dfef622b3d5120c4731edd5a553865ce3116b59c68af8f7141a3c40830b817dabaa9cc23574a75f695918f168a4b74340882644eccadcfe1041350779e136434ee43cdb4f9b45e56cb8ebac54f70e9425dc676e76d4ad9c6b4dd85b7cf11d9ee4910e4af686d3f90", 0xf0, 0xffffffffffff0001}, {&(0x7f0000000380)="1133a601712e38ad8f0afa290dbace4f85266ca76080f26feaa16650369071cd9ba54ca872", 0x25, 0x9}], 0xc0, &(0x7f0000000440)={[{@nogrpid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7f}}], [{@dont_hash}]}) 10:54:31 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:31 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:31 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:31 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:31 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) [ 155.806863] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 155.817256] loop4: detected capacity change from 0 to 264192 [ 155.819325] ext2: Unknown parameter 'dont_hash' 10:54:31 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r0, 0x0, 0x0, 0x9) 10:54:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r0, 0x0, 0x0, 0x9) 10:54:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 10:54:32 executing program 4: r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fallocate(r0, 0x0, 0x0, 0x9) 10:54:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 10:54:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 10:54:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 10:54:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 10:54:33 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:33 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 10:54:33 executing program 5: pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="ef", 0x1}, {0x0}, {&(0x7f0000000900)="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", 0x701}], 0x3, 0x0, 0x0) 10:54:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff02c}, {0x6}]}, 0x10) 10:54:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff02c}, {0x6}]}, 0x10) 10:54:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5609) 10:54:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff02c}, {0x6}]}, 0x10) 10:54:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:33 executing program 1: r0 = memfd_create(&(0x7f0000000500)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\x8dQ\x06\x10\xee\b\xf4\x86\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf644W\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf27x!N;\xb5x\t\xa4E\xbe\x93r\x04\a\x00\x00\x00\x00\x00\x00\x00\"\xa1\xd8\x06>\xc9\xe2\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\x00\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\x00\xde\x82\xb8\xc4g\xb1\\\'e7p\xe6\fI\xdd\x12\x82\xc4\x8ax\xe5d\xfe\x9a\x1b\xa6\v\xc9\x151\x0f\xdf\bq\xb6 n\xc5\xd1\xa2\xac]\xa4w6\xf5=\x97f\xdd\x91_\xe3?Kr', 0x0) finit_module(r0, 0x0, 0x0) 10:54:33 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000015c8e603ccd5b82a2d33414bbe1000000180000003f224dcbbbc59ea2264391704d62c4aad9a481c3a093fedfccfca89d43a0f8fe45e7105ee215f3cbba9497d50301bed05182118412168609eee32903071086b79ccd2963ba908c9bbf36bd4351196afdca3891353bc7c48c34ae2cd90f896521457a5d201a6d45f00362b4266b1a07d9d0f8fcaed7f0ee4d18e61f9024e46412f08945e15189ff80559ea3a11dc5e822640a3813032105a482bed213f71bd76626cae47884b1fa7082bb6cddeae75307395287a2", @ANYRES32, @ANYRES32, @ANYBLOB="000000002e653000000000008778c722d4fe060c4682f6cfc3adc7b6a98d6e868ce934b26df180dc376b513efee7327b5aaf5399c66531594990bdd1552461b844f5fbafdec7df9fc8f71f87b057fdba9fa2926b095a08cc6da9ca2300000000"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000001700)={0x0, 0x2}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x1}, 0x603}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') r2 = memfd_create(&(0x7f0000000000)=')\x00', 0x4) ftruncate(r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES64=r0, @ANYRESHEX, @ANYRES16, @ANYRESDEC, @ANYRES64, @ANYRES32, @ANYRESOCT]) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(0x0, 0x0, &(0x7f0000000600)) io_submit(0x0, 0x7, &(0x7f0000006d40)=[&(0x7f0000004340)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000004300)}, 0x0, &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x3}, &(0x7f00000067c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000006780)="f047442e92bc6ce979a058fd90b5", 0xe}, &(0x7f0000006900)={0x0, 0x0, 0x0, 0x1, 0xfff, 0xffffffffffffffff, &(0x7f0000006800)="2ad207715f54196255c051cd1451a114430eaac356646939708114bdb3b36d7a7afbecf6aa14ff08d708656dd5bd6cabf22c1619530a7213ca69e839d1fc53c04b3a6b9cd9dc23327b2cbaf1fe9c3bf99e19cb7525d45e2cb0966056900619c9af7aac7fa91df18489df82da6e3db85adf71d731e79a2e5db4eeaeaa17ef20dffc847f7eb6af5aeba61b3aced31a523f4645fc7f991965554c04fc5c3281cecca82bab651d83ac9c79c9accaf56b1c188aec2c7c9b93bf70c1d325be46b65f12432c7cb469ba55cbd094e3ac54b40ecef90fb98692", 0xd5, 0x401, 0x0, 0x3}, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x6, 0x4, 0xffffffffffffffff, &(0x7f0000006940)="3ba3e63b404863fa3ccfbdb83bc3af260e722e0cf0d2c828b749fc9d6c96c51db82559bff97b36e8f3f155e29d6cd8b426bb88b13afeba608c25669ac20fe6def4a477375a07b9cd9bd7244b034631a10365e6c479655087dbaa971e389f8e7e2f8c923189f0d7e8dd6d213931c9a6e05ab1aa642614f24d85c420", 0x7b, 0x5}, &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000006a40)="bf503aa034ffafc522157e86a94e3ebc3ab0cb03fc6afa3b53ff1da08c4ba96b06ee8a77bd82beea59b75fff2ee0cb1ae3be5990d5c6ad8fc14bbe033accda352dde581ebc9adaea8bd4dba9815af1b5681e1be23d73202799fbfe9d48b5fd1b66d2d852ccbaf26ecbbc25f7ff665e478a1f968993ec85bd3b659e4d0d4f7f4755938e76a9ef66e61621e3eb644c56602be84c51f36a554b4cdf5e889f55291b5024166af72c5421", 0xa8, 0xffffffffffffffff, 0x0, 0x1}]) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0xa8420, &(0x7f0000000940)={'trans=unix,', {[{@cache_fscache}, {@access_client}, {@access_any}, {@access_uid={'access', 0x3d, 0xee01}}, {@privport}, {@dfltgid}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_user={'obj_user', 0x3d, 'environ\x00'}}, {@subj_role={'subj_role', 0x3d, 'environ\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@measure}]}}) getdents(r1, &(0x7f0000000000)=""/94, 0x20000018) 10:54:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000000)) 10:54:33 executing program 5: pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="ef", 0x1}, {0x0}, {&(0x7f0000000900)="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", 0x701}], 0x3, 0x0, 0x0) 10:54:33 executing program 1: r0 = memfd_create(&(0x7f0000000500)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\x8dQ\x06\x10\xee\b\xf4\x86\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf644W\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf27x!N;\xb5x\t\xa4E\xbe\x93r\x04\a\x00\x00\x00\x00\x00\x00\x00\"\xa1\xd8\x06>\xc9\xe2\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\x00\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\x00\xde\x82\xb8\xc4g\xb1\\\'e7p\xe6\fI\xdd\x12\x82\xc4\x8ax\xe5d\xfe\x9a\x1b\xa6\v\xc9\x151\x0f\xdf\bq\xb6 n\xc5\xd1\xa2\xac]\xa4w6\xf5=\x97f\xdd\x91_\xe3?Kr', 0x0) finit_module(r0, 0x0, 0x0) 10:54:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5609) 10:54:33 executing program 5: pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="ef", 0x1}, {0x0}, {&(0x7f0000000900)="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", 0x701}], 0x3, 0x0, 0x0) 10:54:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff02c}, {0x6}]}, 0x10) 10:54:33 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5609) 10:54:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000000)) 10:54:33 executing program 1: r0 = memfd_create(&(0x7f0000000500)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\x8dQ\x06\x10\xee\b\xf4\x86\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf644W\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf27x!N;\xb5x\t\xa4E\xbe\x93r\x04\a\x00\x00\x00\x00\x00\x00\x00\"\xa1\xd8\x06>\xc9\xe2\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\x00\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\x00\xde\x82\xb8\xc4g\xb1\\\'e7p\xe6\fI\xdd\x12\x82\xc4\x8ax\xe5d\xfe\x9a\x1b\xa6\v\xc9\x151\x0f\xdf\bq\xb6 n\xc5\xd1\xa2\xac]\xa4w6\xf5=\x97f\xdd\x91_\xe3?Kr', 0x0) finit_module(r0, 0x0, 0x0) 10:54:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5609) 10:54:33 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5609) 10:54:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000000)) 10:54:34 executing program 1: r0 = memfd_create(&(0x7f0000000500)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLK\xa4g?K)\xa0\xf0\x9b8Y\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x05\x00\x80\xa1z\x8dQ\x06\x10\xee\b\xf4\x86\xff#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x80L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x04\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf644W\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf27x!N;\xb5x\t\xa4E\xbe\x93r\x04\a\x00\x00\x00\x00\x00\x00\x00\"\xa1\xd8\x06>\xc9\xe2\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\x01\x01\x00\x00\x00\x00\x00\x00\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/\\\x01\xe2\x00\x0e\xe3\xf95\x1d\x10\xa7\x97\xbf\x8e\xac\x81\xc9\x13\x8e\xb3\xf3\xb5d\xa1\xcf\x1d\x92\x9b\x9b\xa7\x12F\xa0\xe0\xff\x1a\x8e\xe2ae^=\n\xe1\xa6\xb8\xe9v\x8f2\xf4\xac\xe5\xdf\xffi`Mo\x1e\x1cMN<\x1b\xd8\xfe\xd6P\xcdQ\x83\xfa\xe7\x1d\xd5\x01n\xa7~\x8b\x90/62\xff;.S\xf7\x0flwa\x16\xf0\xf2(\x96V,\xd7s\xaaOE\xd3H\xfd`}\xd8\xbc\x9a\xca\xe3\n\xd7fCe\xd8\xbb\xdao\xb0\x85\xcc\xedv\x94\xb5\xc4\xb6[>\xb9,\xfch_-s\x94,F\x15\xd8m5>\x94\x84\xf5\x00\xc3\xf6m\xc7B\t{\xe0d\xc65(\x18\x9c\xad\x13b6\xca\x16\x95\xcb^zF\xd0\x1a\x8dP\x94\x19\x00\xde\x82\xb8\xc4g\xb1\\\'e7p\xe6\fI\xdd\x12\x82\xc4\x8ax\xe5d\xfe\x9a\x1b\xa6\v\xc9\x151\x0f\xdf\bq\xb6 n\xc5\xd1\xa2\xac]\xa4w6\xf5=\x97f\xdd\x91_\xe3?Kr', 0x0) finit_module(r0, 0x0, 0x0) 10:54:34 executing program 5: pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="ef", 0x1}, {0x0}, {&(0x7f0000000900)="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", 0x701}], 0x3, 0x0, 0x0) 10:54:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000000)) 10:54:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5609) 10:54:34 executing program 6: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5609) 10:54:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000000)) 10:54:34 executing program 1: pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="ef", 0x1}, {0x0}, {&(0x7f0000000900)="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", 0x701}], 0x3, 0x0, 0x0) 10:54:34 executing program 2: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 10:54:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000000)) 10:54:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 1: pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="ef", 0x1}, {0x0}, {&(0x7f0000000900)="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", 0x701}], 0x3, 0x0, 0x0) 10:54:34 executing program 2: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 10:54:34 executing program 5: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 10:54:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000000)) 10:54:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 5: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 10:54:34 executing program 1: pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="ef", 0x1}, {0x0}, {&(0x7f0000000900)="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", 0x701}], 0x3, 0x0, 0x0) 10:54:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 2: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 10:54:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:34 executing program 4: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) sync_file_range(r0, 0x0, 0xffffffffffff8000, 0x0) 10:54:34 executing program 2: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 10:54:34 executing program 5: syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') 10:54:34 executing program 4: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) sync_file_range(r0, 0x0, 0xffffffffffff8000, 0x0) 10:54:34 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x12004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x10001, 0x0, 0xa, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x18d042, 0x1e6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0x7}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 10:54:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f00000009c0)={0x24, 0x24, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="f1ffffff05"]}]}, 0x24}], 0x1}, 0x0) 10:54:35 executing program 7: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:35 executing program 5: inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xab}, 0x0) 10:54:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000000)={'lo\x00', @ifru_ivalue}) 10:54:35 executing program 1: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) sync_file_range(r0, 0x0, 0xffffffffffff8000, 0x0) 10:54:35 executing program 4: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) sync_file_range(r0, 0x0, 0xffffffffffff8000, 0x0) 10:54:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f00000009c0)={0x24, 0x24, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="f1ffffff05"]}]}, 0x24}], 0x1}, 0x0) 10:54:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000000)={'lo\x00', @ifru_ivalue}) 10:54:35 executing program 5: inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xab}, 0x0) 10:54:35 executing program 1: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) sync_file_range(r0, 0x0, 0xffffffffffff8000, 0x0) 10:54:35 executing program 6: inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xab}, 0x0) 10:54:35 executing program 4: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) sync_file_range(r0, 0x0, 0xffffffffffff8000, 0x0) 10:54:35 executing program 7: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:35 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:35 executing program 6: inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xab}, 0x0) 10:54:35 executing program 1: r0 = fsopen(&(0x7f0000000000)='bdev\x00', 0x0) sync_file_range(r0, 0x0, 0xffffffffffff8000, 0x0) 10:54:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000000)={'lo\x00', @ifru_ivalue}) 10:54:35 executing program 5: inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xab}, 0x0) 10:54:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f00000009c0)={0x24, 0x24, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="f1ffffff05"]}]}, 0x24}], 0x1}, 0x0) 10:54:35 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:35 executing program 7: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 10:54:35 executing program 5: inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xab}, 0x0) 10:54:35 executing program 6: inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xab}, 0x0) 10:54:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000000)={'lo\x00', @ifru_ivalue}) 10:54:35 executing program 1: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:35 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 10:54:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f00000009c0)={0x24, 0x24, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x2}, @nested={0x9, 0x0, 0x0, 0x1, [@generic="f1ffffff05"]}]}, 0x24}], 0x1}, 0x0) 10:54:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 10:54:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 10:54:35 executing program 7: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 159.776609] SELinux: Context  is not valid (left unmapped). [ 159.780584] loop7: detected capacity change from 0 to 40 10:54:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 10:54:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 10:54:35 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:35 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:54:35 executing program 3: lsetxattr(&(0x7f00000000c0)='.\x00', &(0x7f0000000140)=@known='security.selinux\x00', &(0x7f0000000180)='\x02', 0x69c, 0x0) 10:54:35 executing program 6: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:35 executing program 1: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:35 executing program 7: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 10:54:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 10:54:35 executing program 3: lsetxattr(&(0x7f00000000c0)='.\x00', &(0x7f0000000140)=@known='security.selinux\x00', &(0x7f0000000180)='\x02', 0x69c, 0x0) 10:54:35 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:54:35 executing program 6: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:35 executing program 4: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:35 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:54:36 executing program 3: lsetxattr(&(0x7f00000000c0)='.\x00', &(0x7f0000000140)=@known='security.selinux\x00', &(0x7f0000000180)='\x02', 0x69c, 0x0) 10:54:36 executing program 6: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:36 executing program 5: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) [ 160.394039] syz-executor.7: attempt to access beyond end of device [ 160.394039] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 160.398141] Buffer I/O error on dev loop7, logical block 10, lost async page write [ 160.430214] syz-executor.7: attempt to access beyond end of device [ 160.430214] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 160.431517] Buffer I/O error on dev loop7, logical block 10, lost async page write [ 160.784134] BUG: unable to handle page fault for address: ffffed100fffc000 [ 160.784610] #PF: supervisor write access in kernel mode [ 160.784982] #PF: error_code(0x0002) - not-present page [ 160.785327] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 160.785778] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI [ 160.786106] CPU: 1 PID: 5570 Comm: syz-executor.2 Not tainted 6.1.0-rc3-next-20221031 #1 [ 160.786640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 160.787193] RIP: 0010:__memset+0x24/0x50 [ 160.787485] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 160.791577] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 160.792111] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 160.792802] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 160.793590] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 160.794366] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 160.795113] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 160.795810] FS: 00007f3effbfb700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 160.796584] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 160.797154] CR2: ffffed100fffc000 CR3: 00000000367ac000 CR4: 0000000000350ee0 [ 160.797844] Call Trace: [ 160.798106] [ 160.798347] kasan_unpoison+0x23/0x60 [ 160.798742] mempool_exit+0x1c2/0x330 [ 160.799146] bioset_exit+0x2c9/0x630 [ 160.799536] disk_release+0x143/0x490 [ 160.799925] ? disk_release+0x0/0x490 [ 160.800315] ? device_release+0x0/0x250 [ 160.800716] device_release+0xa2/0x250 [ 160.801110] ? device_release+0x0/0x250 [ 160.801506] kobject_put+0x173/0x280 [ 160.801889] put_device+0x1b/0x40 [ 160.802245] put_disk+0x41/0x60 [ 160.802610] loop_control_ioctl+0x4d1/0x630 [ 160.803050] ? loop_control_ioctl+0x0/0x630 [ 160.803417] ? selinux_file_ioctl+0xb1/0x270 [ 160.803703] ? loop_control_ioctl+0x0/0x630 [ 160.803976] __x64_sys_ioctl+0x19a/0x220 [ 160.804238] do_syscall_64+0x3b/0xa0 [ 160.804480] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 160.804800] RIP: 0033:0x7f3f02685b19 [ 160.805071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.806184] RSP: 002b:00007f3effbfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 160.806648] RAX: ffffffffffffffda RBX: 00007f3f02798f60 RCX: 00007f3f02685b19 [ 160.807142] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006 [ 160.807638] RBP: 00007f3f026dff6d R08: 0000000000000000 R09: 0000000000000000 [ 160.808136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 160.808606] R13: 00007ffd918ff70f R14: 00007f3effbfb300 R15: 0000000000022000 [ 160.809082] [ 160.809244] Modules linked in: [ 160.809461] CR2: ffffed100fffc000 [ 160.809698] ---[ end trace 0000000000000000 ]--- [ 160.810022] RIP: 0010:__memset+0x24/0x50 [ 160.810305] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 160.811483] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 160.811839] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 160.812302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 160.812761] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 160.813228] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 160.813691] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 160.814155] FS: 00007f3effbfb700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 160.814693] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 160.815078] CR2: ffffed100fffc000 CR3: 00000000367ac000 CR4: 0000000000350ee0 10:54:36 executing program 4: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:36 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:54:36 executing program 1: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:36 executing program 3: lsetxattr(&(0x7f00000000c0)='.\x00', &(0x7f0000000140)=@known='security.selinux\x00', &(0x7f0000000180)='\x02', 0x69c, 0x0) 10:54:36 executing program 6: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:36 executing program 5: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:36 executing program 7: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:36 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 160.941981] loop7: detected capacity change from 0 to 40 10:54:36 executing program 4: io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1ffffffffffffd46, &(0x7f00000000c0)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:54:36 executing program 1: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:36 executing program 6: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:37 executing program 5: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) [ 161.073336] syz-executor.7: attempt to access beyond end of device [ 161.073336] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 161.074657] Buffer I/O error on dev loop7, logical block 10, lost async page write 10:54:37 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:37 executing program 3: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 161.167959] BUG: unable to handle page fault for address: ffffed100fffc000 [ 161.168484] #PF: supervisor write access in kernel mode [ 161.168869] #PF: error_code(0x0002) - not-present page [ 161.169218] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 161.169688] Oops: 0002 [#2] PREEMPT SMP KASAN NOPTI [ 161.170059] CPU: 1 PID: 5618 Comm: syz-executor.2 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 161.170740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 161.171297] RIP: 0010:__memset+0x24/0x50 [ 161.171594] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.172874] RSP: 0018:ffff888039327cc0 EFLAGS: 00010216 [ 161.173239] RAX: 0000000000000000 RBX: ffff88800c019240 RCX: 1ffffe21fe601bbb [ 161.173721] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.174216] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803248 [ 161.174711] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.175215] R13: ffff88800c019240 R14: ffffffff815f27a0 R15: 1ffff1100112301f [ 161.175748] FS: 00007f3effbfb700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 161.176330] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.176724] CR2: ffffed100fffc000 CR3: 00000000203b6000 CR4: 0000000000350ee0 [ 161.177213] Call Trace: [ 161.177399] [ 161.177566] kasan_unpoison+0x23/0x60 [ 161.177857] mempool_exit+0x1c2/0x330 [ 161.178169] bioset_exit+0x2c9/0x630 [ 161.178481] disk_release+0x143/0x490 [ 161.178759] ? disk_release+0x0/0x490 [ 161.179022] ? device_release+0x0/0x250 [ 161.179300] device_release+0xa2/0x250 [ 161.179569] ? device_release+0x0/0x250 [ 161.179843] kobject_put+0x173/0x280 [ 161.180108] put_device+0x1b/0x40 [ 161.180351] put_disk+0x41/0x60 [ 161.180588] loop_control_ioctl+0x4d1/0x630 [ 161.180884] ? loop_control_ioctl+0x0/0x630 [ 161.181180] ? selinux_file_ioctl+0xb1/0x270 [ 161.181530] ? loop_control_ioctl+0x0/0x630 [ 161.181847] __x64_sys_ioctl+0x19a/0x220 [ 161.182155] do_syscall_64+0x3b/0xa0 [ 161.182437] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 161.182802] RIP: 0033:0x7f3f02685b19 [ 161.183062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.184321] RSP: 002b:00007f3effbfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.184863] RAX: ffffffffffffffda RBX: 00007f3f02798f60 RCX: 00007f3f02685b19 [ 161.185344] RDX: 0000000000000001 RSI: 0000000000004c81 RDI: 0000000000000006 [ 161.185826] RBP: 00007f3f026dff6d R08: 0000000000000000 R09: 0000000000000000 [ 161.186305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 161.186794] R13: 00007ffd918ff70f R14: 00007f3effbfb300 R15: 0000000000022000 [ 161.187330] [ 161.187511] Modules linked in: [ 161.187756] CR2: ffffed100fffc000 [ 161.188018] ---[ end trace 0000000000000000 ]--- [ 161.188348] RIP: 0010:__memset+0x24/0x50 [ 161.188626] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.189901] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 161.190289] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 161.190780] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.191263] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 161.191769] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.192283] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 161.192779] FS: 00007f3effbfb700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 161.193336] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.193734] CR2: ffffed100fffc000 CR3: 00000000203b6000 CR4: 0000000000350ee0 [ 161.282150] BUG: unable to handle page fault for address: ffffed100fffc000 [ 161.282691] #PF: supervisor write access in kernel mode [ 161.283046] #PF: error_code(0x0002) - not-present page [ 161.283395] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 161.283841] Oops: 0002 [#3] PREEMPT SMP KASAN NOPTI [ 161.284179] CPU: 0 PID: 5629 Comm: syz-executor.0 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 161.284803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 161.285344] RIP: 0010:__memset+0x24/0x50 [ 161.285641] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.286838] RSP: 0018:ffff88803b287cc0 EFLAGS: 00010216 [ 161.287196] RAX: 0000000000000000 RBX: ffff88800c019540 RCX: 1ffffe21fe601bc7 [ 161.287669] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.288141] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed10018032a8 [ 161.288611] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.289083] R13: ffff88800c019540 R14: ffffffff815f27a0 R15: 1ffff1100110bc1f [ 161.289556] FS: 00007fb2ebf40700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 161.290087] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.290499] CR2: ffffed100fffc000 CR3: 0000000020358000 CR4: 0000000000350ef0 [ 161.290977] Call Trace: [ 161.291157] [ 161.291321] kasan_unpoison+0x23/0x60 [ 161.291589] mempool_exit+0x1c2/0x330 [ 161.291863] bioset_exit+0x2c9/0x630 [ 161.292126] disk_release+0x143/0x490 [ 161.292392] ? disk_release+0x0/0x490 [ 161.292654] ? device_release+0x0/0x250 [ 161.292932] device_release+0xa2/0x250 [ 161.293201] ? device_release+0x0/0x250 [ 161.293475] kobject_put+0x173/0x280 [ 161.293736] put_device+0x1b/0x40 [ 161.293978] put_disk+0x41/0x60 [ 161.294211] loop_control_ioctl+0x4d1/0x630 [ 161.294517] ? loop_control_ioctl+0x0/0x630 [ 161.294818] ? selinux_file_ioctl+0xb1/0x270 [ 161.295135] ? loop_control_ioctl+0x0/0x630 [ 161.295435] __x64_sys_ioctl+0x19a/0x220 [ 161.295720] do_syscall_64+0x3b/0xa0 [ 161.295987] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 161.296339] RIP: 0033:0x7fb2ee9cab19 [ 161.296594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.297793] RSP: 002b:00007fb2ebf40188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.298299] RAX: ffffffffffffffda RBX: 00007fb2eeaddf60 RCX: 00007fb2ee9cab19 [ 161.298781] RDX: 0000000000000003 RSI: 0000000000004c81 RDI: 0000000000000006 [ 161.299249] RBP: 00007fb2eea24f6d R08: 0000000000000000 R09: 0000000000000000 [ 161.299718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 161.300186] R13: 00007ffd4da655cf R14: 00007fb2ebf40300 R15: 0000000000022000 [ 161.300666] [ 161.300829] Modules linked in: [ 161.301045] CR2: ffffed100fffc000 [ 161.301285] ---[ end trace 0000000000000000 ]--- [ 161.301599] RIP: 0010:__memset+0x24/0x50 [ 161.301881] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.303075] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 161.303428] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 161.303900] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.304374] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 161.304846] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.305320] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 161.305792] FS: 00007fb2ebf40700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 161.306325] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.306756] CR2: ffffed100fffc000 CR3: 0000000020358000 CR4: 0000000000350ef0 10:54:37 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:37 executing program 4: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:37 executing program 7: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 161.373739] loop7: detected capacity change from 0 to 40 [ 161.391498] BUG: unable to handle page fault for address: ffffed100fffc000 [ 161.392039] #PF: supervisor write access in kernel mode [ 161.392383] #PF: error_code(0x0002) - not-present page [ 161.392747] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 161.393181] Oops: 0002 [#4] PREEMPT SMP KASAN NOPTI [ 161.393510] CPU: 1 PID: 5622 Comm: syz-executor.6 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 161.394124] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 161.394683] RIP: 0010:__memset+0x24/0x50 [ 161.394975] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.396124] RSP: 0018:ffff888039477cc0 EFLAGS: 00010216 [ 161.396473] RAX: 0000000000000000 RBX: ffff88800c0193c0 RCX: 1ffffe21fe601bc1 [ 161.396962] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.397443] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803278 [ 161.397901] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.398371] R13: ffff88800c0193c0 R14: ffffffff815f27a0 R15: 1ffff1100119941f [ 161.398831] FS: 00007f3743709700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 161.399357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.399729] CR2: ffffed100fffc000 CR3: 0000000037398000 CR4: 0000000000350ee0 [ 161.400187] Call Trace: [ 161.400362] [ 161.400513] kasan_unpoison+0x23/0x60 [ 161.400773] mempool_exit+0x1c2/0x330 [ 161.401044] bioset_exit+0x2c9/0x630 [ 161.401309] disk_release+0x143/0x490 [ 161.401571] ? disk_release+0x0/0x490 [ 161.401831] ? device_release+0x0/0x250 [ 161.402100] device_release+0xa2/0x250 [ 161.402383] ? device_release+0x0/0x250 [ 161.402648] kobject_put+0x173/0x280 [ 161.402899] put_device+0x1b/0x40 [ 161.403131] put_disk+0x41/0x60 [ 161.403371] loop_control_ioctl+0x4d1/0x630 [ 161.403675] ? loop_control_ioctl+0x0/0x630 [ 161.403986] ? selinux_file_ioctl+0xb1/0x270 [ 161.404310] ? loop_control_ioctl+0x0/0x630 [ 161.404623] __x64_sys_ioctl+0x19a/0x220 [ 161.404923] do_syscall_64+0x3b/0xa0 [ 161.405183] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 161.405547] RIP: 0033:0x7f3746193b19 [ 161.405811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.407037] RSP: 002b:00007f3743709188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.407561] RAX: ffffffffffffffda RBX: 00007f37462a6f60 RCX: 00007f3746193b19 [ 161.408050] RDX: 0000000000000002 RSI: 0000000000004c81 RDI: 0000000000000006 [ 161.408542] RBP: 00007f37461edf6d R08: 0000000000000000 R09: 0000000000000000 [ 161.409034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 161.409514] R13: 00007ffca3fbd50f R14: 00007f3743709300 R15: 0000000000022000 [ 161.410019] [ 161.410185] Modules linked in: [ 161.410418] CR2: ffffed100fffc000 [ 161.410659] ---[ end trace 0000000000000000 ]--- [ 161.410990] RIP: 0010:__memset+0x24/0x50 [ 161.411281] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.412500] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 161.412868] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 161.413358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.413843] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 161.414312] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.414809] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 161.415300] FS: 00007f3743709700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 161.415856] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.416257] CR2: ffffed100fffc000 CR3: 0000000037398000 CR4: 0000000000350ee0 [ 161.517557] BUG: unable to handle page fault for address: ffffed100fffc000 [ 161.518073] #PF: supervisor write access in kernel mode [ 161.518428] #PF: error_code(0x0002) - not-present page [ 161.518768] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 161.519218] Oops: 0002 [#5] PREEMPT SMP KASAN NOPTI [ 161.519545] CPU: 1 PID: 5632 Comm: syz-executor.3 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 161.520148] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 161.520675] RIP: 0010:__memset+0x24/0x50 [ 161.520969] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.522138] RSP: 0018:ffff88803715fcc0 EFLAGS: 00010216 [ 161.522514] RAX: 0000000000000000 RBX: ffff88800c0196c0 RCX: 1ffffe21fe601bcd [ 161.522986] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.523458] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed10018032d8 [ 161.523970] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.524442] R13: ffff88800c0196c0 R14: ffffffff815f27a0 R15: 1ffff11001112c1f [ 161.524911] FS: 00007f3744e1e700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 161.525436] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.525818] CR2: ffffed100fffc000 CR3: 0000000020498000 CR4: 0000000000350ee0 [ 161.526281] Call Trace: [ 161.526470] [ 161.526627] kasan_unpoison+0x23/0x60 [ 161.526890] mempool_exit+0x1c2/0x330 [ 161.527154] bioset_exit+0x2c9/0x630 [ 161.527423] disk_release+0x143/0x490 [ 161.527690] ? disk_release+0x0/0x490 [ 161.527950] ? device_release+0x0/0x250 [ 161.528216] device_release+0xa2/0x250 [ 161.528476] ? device_release+0x0/0x250 [ 161.528741] kobject_put+0x173/0x280 [ 161.528996] put_device+0x1b/0x40 [ 161.529239] put_disk+0x41/0x60 [ 161.529473] loop_control_ioctl+0x4d1/0x630 [ 161.529771] ? loop_control_ioctl+0x0/0x630 [ 161.530062] ? selinux_file_ioctl+0xb1/0x270 [ 161.530378] ? loop_control_ioctl+0x0/0x630 [ 161.530674] __x64_sys_ioctl+0x19a/0x220 [ 161.530964] do_syscall_64+0x3b/0xa0 [ 161.531223] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 161.531568] RIP: 0033:0x7f37478c9b19 [ 161.531829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.532989] RSP: 002b:00007f3744e1e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.533514] RAX: ffffffffffffffda RBX: 00007f37479dd020 RCX: 00007f37478c9b19 [ 161.534011] RDX: 0000000000000004 RSI: 0000000000004c81 RDI: 0000000000000006 [ 161.534513] RBP: 00007f3747923f6d R08: 0000000000000000 R09: 0000000000000000 [ 161.534971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 161.535432] R13: 00007fff77369cbf R14: 00007f3744e1e300 R15: 0000000000022000 [ 161.535907] [ 161.536065] Modules linked in: [ 161.536284] CR2: ffffed100fffc000 [ 161.536515] ---[ end trace 0000000000000000 ]--- [ 161.536824] RIP: 0010:__memset+0x24/0x50 [ 161.537109] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.538269] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 161.538623] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 161.539082] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.539543] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 161.539999] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.540460] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 161.540925] FS: 00007f3744e1e700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 161.541438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.541820] CR2: ffffed100fffc000 CR3: 0000000020498000 CR4: 0000000000350ee0 [ 161.622400] BUG: unable to handle page fault for address: ffffed100fffc000 [ 161.622943] #PF: supervisor write access in kernel mode [ 161.623297] #PF: error_code(0x0002) - not-present page [ 161.623643] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 161.624097] Oops: 0002 [#6] PREEMPT SMP KASAN NOPTI [ 161.624432] CPU: 0 PID: 5645 Comm: syz-executor.1 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 161.625064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 161.625605] RIP: 0010:__memset+0x24/0x50 [ 161.625897] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.627097] RSP: 0018:ffff888038d57cc0 EFLAGS: 00010216 [ 161.627453] RAX: 0000000000000000 RBX: ffff88800c019840 RCX: 1ffffe21fe601bd3 [ 161.627923] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.628399] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803308 [ 161.628871] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.629345] R13: ffff88800c019840 R14: ffffffff815f27a0 R15: 1ffff1100111241f [ 161.629819] FS: 00007fa3c59f1700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 161.630365] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.630754] CR2: ffffed100fffc000 CR3: 00000000151c2000 CR4: 0000000000350ef0 [ 161.631233] Call Trace: [ 161.631415] [ 161.631577] kasan_unpoison+0x23/0x60 [ 161.631843] mempool_exit+0x1c2/0x330 [ 161.632115] bioset_exit+0x2c9/0x630 [ 161.632385] disk_release+0x143/0x490 [ 161.632652] ? disk_release+0x0/0x490 [ 161.632915] ? device_release+0x0/0x250 [ 161.633190] device_release+0xa2/0x250 [ 161.633457] ? device_release+0x0/0x250 [ 161.633728] kobject_put+0x173/0x280 [ 161.633988] put_device+0x1b/0x40 [ 161.634230] put_disk+0x41/0x60 [ 161.634468] loop_control_ioctl+0x4d1/0x630 [ 161.634769] ? loop_control_ioctl+0x0/0x630 [ 161.635063] ? selinux_file_ioctl+0xb1/0x270 [ 161.635375] ? loop_control_ioctl+0x0/0x630 [ 161.635674] __x64_sys_ioctl+0x19a/0x220 [ 161.635959] do_syscall_64+0x3b/0xa0 [ 161.636223] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 161.636573] RIP: 0033:0x7fa3c849cb19 [ 161.636825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.638009] RSP: 002b:00007fa3c59f1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.638523] RAX: ffffffffffffffda RBX: 00007fa3c85b0020 RCX: 00007fa3c849cb19 [ 161.639004] RDX: 0000000000000005 RSI: 0000000000004c81 RDI: 0000000000000006 [ 161.639474] RBP: 00007fa3c84f6f6d R08: 0000000000000000 R09: 0000000000000000 [ 161.639955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 161.640430] R13: 00007ffdd7beb5ff R14: 00007fa3c59f1300 R15: 0000000000022000 [ 161.640911] [ 161.641074] Modules linked in: [ 161.641296] CR2: ffffed100fffc000 [ 161.641533] ---[ end trace 0000000000000000 ]--- [ 161.641850] RIP: 0010:__memset+0x24/0x50 [ 161.642140] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 161.643329] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 161.643684] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 161.644156] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 161.644625] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 161.645099] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 161.645577] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 161.646049] FS: 00007fa3c59f1700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 161.646589] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.646975] CR2: ffffed100fffc000 CR3: 00000000151c2000 CR4: 0000000000350ef0 10:54:38 executing program 3: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 4: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 7: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:38 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 6: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 5: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 162.237414] loop7: detected capacity change from 0 to 40 [ 162.348247] syz-executor.7: attempt to access beyond end of device [ 162.348247] loop7: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 162.349357] Buffer I/O error on dev loop7, logical block 10, lost async page write [ 162.415247] BUG: unable to handle page fault for address: ffffed100fffc000 [ 162.415765] #PF: supervisor write access in kernel mode [ 162.416119] #PF: error_code(0x0002) - not-present page [ 162.416488] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 162.416984] Oops: 0002 [#7] PREEMPT SMP KASAN NOPTI [ 162.417349] CPU: 1 PID: 5661 Comm: syz-executor.4 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 162.417961] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 162.418522] RIP: 0010:__memset+0x24/0x50 [ 162.418849] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 162.420180] RSP: 0018:ffff88803a0f7cc0 EFLAGS: 00010216 [ 162.420575] RAX: 0000000000000000 RBX: ffff88800c0199c0 RCX: 1ffffe21fe601bd9 [ 162.421064] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 162.421532] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803338 [ 162.422027] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 162.422585] R13: ffff88800c0199c0 R14: ffffffff815f27a0 R15: 1ffff110011fce1f [ 162.423093] FS: 00007fc33f332700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 162.423626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.424020] CR2: ffffed100fffc000 CR3: 000000001310a000 CR4: 0000000000350ee0 [ 162.424556] Call Trace: [ 162.424753] [ 162.424933] kasan_unpoison+0x23/0x60 [ 162.425227] mempool_exit+0x1c2/0x330 [ 162.425530] bioset_exit+0x2c9/0x630 [ 162.425828] disk_release+0x143/0x490 [ 162.426128] ? disk_release+0x0/0x490 [ 162.426421] ? device_release+0x0/0x250 [ 162.426699] device_release+0xa2/0x250 [ 162.426970] ? device_release+0x0/0x250 [ 162.427242] kobject_put+0x173/0x280 [ 162.427533] put_device+0x1b/0x40 [ 162.427796] put_disk+0x41/0x60 [ 162.428063] loop_control_ioctl+0x4d1/0x630 [ 162.428400] ? loop_control_ioctl+0x0/0x630 [ 162.428734] ? selinux_file_ioctl+0xb1/0x270 [ 162.429087] ? loop_control_ioctl+0x0/0x630 [ 162.429423] __x64_sys_ioctl+0x19a/0x220 [ 162.429739] do_syscall_64+0x3b/0xa0 [ 162.430033] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 162.430431] RIP: 0033:0x7fc341dbcb19 [ 162.430715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.431988] RSP: 002b:00007fc33f332188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 162.432545] RAX: ffffffffffffffda RBX: 00007fc341ecff60 RCX: 00007fc341dbcb19 [ 162.433060] RDX: 0000000000000006 RSI: 0000000000004c81 RDI: 0000000000000006 [ 162.433563] RBP: 00007fc341e16f6d R08: 0000000000000000 R09: 0000000000000000 [ 162.434083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 162.434634] R13: 00007ffdadf59f8f R14: 00007fc33f332300 R15: 0000000000022000 [ 162.435176] [ 162.435349] Modules linked in: [ 162.435581] CR2: ffffed100fffc000 [ 162.435829] ---[ end trace 0000000000000000 ]--- [ 162.436169] RIP: 0010:__memset+0x24/0x50 [ 162.436486] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 162.437836] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 162.438217] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 162.438739] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 162.439278] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 162.439812] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 162.440346] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 162.440873] FS: 00007fc33f332700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 162.441434] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.441852] CR2: ffffed100fffc000 CR3: 000000001310a000 CR4: 0000000000350ee0 10:54:38 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 5: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 3: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 6: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 7: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:38 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 162.796811] BUG: unable to handle page fault for address: ffffed100fffc000 [ 162.797402] #PF: supervisor write access in kernel mode [ 162.797797] #PF: error_code(0x0002) - not-present page [ 162.798180] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 162.798684] Oops: 0002 [#8] PREEMPT SMP KASAN NOPTI [ 162.799063] CPU: 0 PID: 5695 Comm: syz-executor.2 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 162.799766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 162.800347] RIP: 0010:__memset+0x24/0x50 [ 162.800649] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 162.801841] RSP: 0018:ffff888038417cc0 EFLAGS: 00010216 [ 162.802204] RAX: 0000000000000000 RBX: ffff88800c019f00 RCX: 1ffffe21fe601bee [ 162.802688] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 162.803172] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed10018033e0 [ 162.803645] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 162.804111] R13: ffff88800c019f00 R14: ffffffff815f27a0 R15: 1ffff1100701cc1f [ 162.804579] FS: 00007f3effbfb700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 162.805121] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.805515] CR2: ffffed100fffc000 CR3: 000000000cfb0000 CR4: 0000000000350ef0 [ 162.805989] Call Trace: [ 162.806167] [ 162.806329] kasan_unpoison+0x23/0x60 [ 162.806603] mempool_exit+0x1c2/0x330 [ 162.806877] bioset_exit+0x2c9/0x630 [ 162.807141] disk_release+0x143/0x490 [ 162.807405] ? disk_release+0x0/0x490 [ 162.807672] ? device_release+0x0/0x250 [ 162.807946] device_release+0xa2/0x250 [ 162.808217] ? device_release+0x0/0x250 [ 162.808490] kobject_put+0x173/0x280 [ 162.808756] put_device+0x1b/0x40 [ 162.808996] put_disk+0x41/0x60 [ 162.809229] loop_control_ioctl+0x4d1/0x630 [ 162.809529] ? loop_control_ioctl+0x0/0x630 [ 162.809830] ? __x64_sys_ioctl+0xbe/0x220 [ 162.810119] ? loop_control_ioctl+0x0/0x630 [ 162.810425] __x64_sys_ioctl+0x19a/0x220 [ 162.810713] do_syscall_64+0x3b/0xa0 [ 162.810979] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 162.811325] RIP: 0033:0x7f3f02685b19 [ 162.811578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.812752] RSP: 002b:00007f3effbfb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 162.813259] RAX: ffffffffffffffda RBX: 00007f3f02798f60 RCX: 00007f3f02685b19 [ 162.813726] RDX: 0000000000000003 RSI: 0000000000004c81 RDI: 0000000000000006 [ 162.814195] RBP: 00007f3f026dff6d R08: 0000000000000000 R09: 0000000000000000 [ 162.814677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 162.815150] R13: 00007ffd918ff70f R14: 00007f3effbfb300 R15: 0000000000022000 [ 162.815628] [ 162.815787] Modules linked in: [ 162.816009] CR2: ffffed100fffc000 [ 162.816244] ---[ end trace 0000000000000000 ]--- [ 162.816560] RIP: 0010:__memset+0x24/0x50 [ 162.816845] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 162.818090] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 162.818478] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 162.818992] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 162.819461] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 162.819934] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 162.820397] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 162.820880] FS: 00007f3effbfb700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 162.821401] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.821791] CR2: ffffed100fffc000 CR3: 000000000cfb0000 CR4: 0000000000350ef0 [ 162.922840] BUG: unable to handle page fault for address: ffffed100fffc000 [ 162.923455] #PF: supervisor write access in kernel mode [ 162.923875] #PF: error_code(0x0002) - not-present page [ 162.924286] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 162.924815] Oops: 0002 [#9] PREEMPT SMP KASAN NOPTI [ 162.925205] CPU: 0 PID: 5696 Comm: syz-executor.5 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 162.925941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 162.926583] RIP: 0010:__memset+0x24/0x50 [ 162.926931] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 162.928309] RSP: 0018:ffff88803863fcc0 EFLAGS: 00010216 [ 162.928726] RAX: 0000000000000000 RBX: ffff88800c019d80 RCX: 1ffffe21fe601be8 [ 162.929266] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 162.929806] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed10018033b0 [ 162.930361] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 162.930902] R13: ffff88800c019d80 R14: ffffffff815f27a0 R15: 1ffff1100701ca1f [ 162.931449] FS: 00007f92b7870700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 162.932068] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.932518] CR2: ffffed100fffc000 CR3: 000000000e930000 CR4: 0000000000350ef0 [ 162.933065] Call Trace: [ 162.933269] [ 162.933454] kasan_unpoison+0x23/0x60 [ 162.933757] mempool_exit+0x1c2/0x330 [ 162.934067] bioset_exit+0x2c9/0x630 [ 162.934388] disk_release+0x143/0x490 [ 162.934698] ? disk_release+0x0/0x490 [ 162.935005] ? device_release+0x0/0x250 [ 162.935321] device_release+0xa2/0x250 [ 162.935631] ? device_release+0x0/0x250 [ 162.935943] kobject_put+0x173/0x280 [ 162.936240] put_device+0x1b/0x40 [ 162.936526] put_disk+0x41/0x60 [ 162.936791] loop_control_ioctl+0x4d1/0x630 [ 162.937136] ? loop_control_ioctl+0x0/0x630 [ 162.937480] ? selinux_file_ioctl+0xb1/0x270 [ 162.937841] ? loop_control_ioctl+0x0/0x630 [ 162.938186] __x64_sys_ioctl+0x19a/0x220 [ 162.938523] do_syscall_64+0x3b/0xa0 [ 162.938830] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 162.939231] RIP: 0033:0x7f92ba2fab19 [ 162.939523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.940897] RSP: 002b:00007f92b7870188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 162.941493] RAX: ffffffffffffffda RBX: 00007f92ba40df60 RCX: 00007f92ba2fab19 [ 162.942037] RDX: 0000000000000004 RSI: 0000000000004c81 RDI: 0000000000000006 [ 162.942582] RBP: 00007f92ba354f6d R08: 0000000000000000 R09: 0000000000000000 [ 162.943131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 162.943676] R13: 00007fff4d3d320f R14: 00007f92b7870300 R15: 0000000000022000 [ 162.944227] [ 162.944418] Modules linked in: [ 162.944669] CR2: ffffed100fffc000 [ 162.944943] ---[ end trace 0000000000000000 ]--- [ 162.945302] RIP: 0010:__memset+0x24/0x50 [ 162.945627] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 162.947030] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 162.947318] BUG: unable to handle page fault for address: ffffed100fffc000 [ 162.947441] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 162.947962] #PF: supervisor write access in kernel mode [ 162.948483] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 162.948837] #PF: error_code(0x0002) - not-present page [ 162.949360] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 162.949712] PGD 7ffd3067 [ 162.950226] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 162.950441] P4D 7ffd3067 [ 162.950953] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 162.950967] FS: 00007f92b7870700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 162.951154] PUD 7ffd2067 [ 162.951682] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.952210] PMD 7ffd1067 [ 162.952409] CR2: ffffed100fffc000 CR3: 000000000e930000 CR4: 0000000000350ef0 [ 162.952794] PTE 0 [ 162.953684] Oops: 0002 [#10] PREEMPT SMP KASAN NOPTI [ 162.954034] CPU: 1 PID: 5688 Comm: syz-executor.7 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 162.954682] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 162.955238] RIP: 0010:__memset+0x24/0x50 [ 162.955542] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 162.956768] RSP: 0018:ffff88803b3bfcc0 EFLAGS: 00010216 [ 162.957138] RAX: 0000000000000000 RBX: ffff88800a4a26c0 RCX: 1ffffe21fe593e0d 10:54:38 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 162.957625] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 162.958311] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed10014944d8 [ 162.958798] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 162.959276] R13: ffff88800a4a26c0 R14: ffffffff815f27a0 R15: 1ffff110011f8c1f [ 162.959743] FS: 00007f3dcf079700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 162.960292] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.960692] CR2: ffffed100fffc000 CR3: 0000000013cd8000 CR4: 0000000000350ee0 [ 162.961151] Call Trace: [ 162.961317] [ 162.961464] kasan_unpoison+0x23/0x60 [ 162.961713] mempool_exit+0x1c2/0x330 [ 162.961970] bioset_exit+0x2c9/0x630 [ 162.962218] disk_release+0x143/0x490 [ 162.962479] ? disk_release+0x0/0x490 [ 162.962727] ? device_release+0x0/0x250 [ 162.963003] device_release+0xa2/0x250 [ 162.963254] ? device_release+0x0/0x250 [ 162.963505] kobject_put+0x173/0x280 [ 162.963748] put_device+0x1b/0x40 [ 162.963975] put_disk+0x41/0x60 [ 162.964193] loop_control_ioctl+0x4d1/0x630 [ 162.964477] ? loop_control_ioctl+0x0/0x630 [ 162.964750] ? selinux_file_ioctl+0xb1/0x270 [ 162.965045] ? loop_control_ioctl+0x0/0x630 [ 162.965320] __x64_sys_ioctl+0x19a/0x220 [ 162.965589] do_syscall_64+0x3b/0xa0 [ 162.965837] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 162.966163] RIP: 0033:0x7f3dd1b03b19 [ 162.966406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.967490] RSP: 002b:00007f3dcf079188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 162.967952] RAX: ffffffffffffffda RBX: 00007f3dd1c16f60 RCX: 00007f3dd1b03b19 [ 162.968388] RDX: 0000000000000001 RSI: 0000000000004c81 RDI: 0000000000000006 [ 162.968822] RBP: 00007f3dd1b5df6d R08: 0000000000000000 R09: 0000000000000000 [ 162.969256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 162.969688] R13: 00007ffe4089e6bf R14: 00007f3dcf079300 R15: 0000000000022000 [ 162.970129] [ 162.970280] Modules linked in: [ 162.970495] CR2: ffffed100fffc000 [ 162.970713] ---[ end trace 0000000000000000 ]--- [ 162.971001] RIP: 0010:__memset+0x24/0x50 [ 162.971269] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 162.972348] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 162.972674] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 162.973105] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 162.973537] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 162.973970] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 162.974414] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 162.974850] FS: 00007f3dcf079700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 162.975337] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.975692] CR2: ffffed100fffc000 CR3: 0000000013cd8000 CR4: 0000000000350ee0 [ 163.059125] BUG: unable to handle page fault for address: ffffed100fffc000 [ 163.059677] #PF: supervisor write access in kernel mode [ 163.060038] #PF: error_code(0x0002) - not-present page [ 163.060387] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 163.060861] Oops: 0002 [#11] PREEMPT SMP KASAN NOPTI [ 163.061236] CPU: 1 PID: 5686 Comm: syz-executor.6 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 163.061904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 163.062461] RIP: 0010:__memset+0x24/0x50 [ 163.062756] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.063987] RSP: 0018:ffff8880394bfcc0 EFLAGS: 00010216 10:54:39 executing program 4: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 163.064352] RAX: 0000000000000000 RBX: ffff88800a4a2540 RCX: 1ffffe21fe593e07 [ 163.065050] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.065533] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed10014944a8 [ 163.066010] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.066492] R13: ffff88800a4a2540 R14: ffffffff815f27a0 R15: 1ffff110054dae1f [ 163.066966] FS: 00007f3743709700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 163.067490] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.067866] CR2: ffffed100fffc000 CR3: 0000000013650000 CR4: 0000000000350ee0 [ 163.068337] Call Trace: [ 163.068516] [ 163.068690] kasan_unpoison+0x23/0x60 [ 163.068967] mempool_exit+0x1c2/0x330 [ 163.069253] bioset_exit+0x2c9/0x630 [ 163.069532] disk_release+0x143/0x490 [ 163.069817] ? disk_release+0x0/0x490 [ 163.070095] ? device_release+0x0/0x250 [ 163.070387] device_release+0xa2/0x250 [ 163.070672] ? device_release+0x0/0x250 [ 163.070966] kobject_put+0x173/0x280 [ 163.071246] put_device+0x1b/0x40 [ 163.071503] put_disk+0x41/0x60 [ 163.071767] loop_control_ioctl+0x4d1/0x630 [ 163.072087] ? loop_control_ioctl+0x0/0x630 [ 163.072406] ? selinux_file_ioctl+0xb1/0x270 [ 163.072736] ? loop_control_ioctl+0x0/0x630 [ 163.073053] __x64_sys_ioctl+0x19a/0x220 [ 163.073351] do_syscall_64+0x3b/0xa0 [ 163.073636] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 163.074007] RIP: 0033:0x7f3746193b19 [ 163.074275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.075568] RSP: 002b:00007f3743709188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.076115] RAX: ffffffffffffffda RBX: 00007f37462a6f60 RCX: 00007f3746193b19 [ 163.076623] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006 [ 163.077132] RBP: 00007f37461edf6d R08: 0000000000000000 R09: 0000000000000000 [ 163.077640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 163.078145] R13: 00007ffca3fbd50f R14: 00007f3743709300 R15: 0000000000022000 [ 163.078658] [ 163.078826] Modules linked in: [ 163.079061] CR2: ffffed100fffc000 [ 163.079312] ---[ end trace 0000000000000000 ]--- [ 163.079655] RIP: 0010:__memset+0x24/0x50 [ 163.079969] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.081268] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 163.081668] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 163.082198] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.082724] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 163.083252] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.083779] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 163.084308] FS: 00007f3743709700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 163.084903] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.085331] CR2: ffffed100fffc000 CR3: 0000000013650000 CR4: 0000000000350ee0 [ 163.164439] BUG: unable to handle page fault for address: ffffed100fffc000 [ 163.165025] #PF: supervisor write access in kernel mode [ 163.165427] #PF: error_code(0x0002) - not-present page [ 163.165825] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 163.166316] Oops: 0002 [#12] PREEMPT SMP KASAN NOPTI [ 163.166715] CPU: 1 PID: 5699 Comm: syz-executor.1 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 163.167400] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 163.167999] RIP: 0010:__memset+0x24/0x50 [ 163.168323] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.169637] RSP: 0018:ffff88803ad47cc0 EFLAGS: 00010216 [ 163.170028] RAX: 0000000000000000 RBX: ffff88800a4a2840 RCX: 1ffffe21fe593e13 [ 163.170579] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.171094] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001494508 [ 163.171630] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.172157] R13: ffff88800a4a2840 R14: ffffffff815f27a0 R15: 1ffff1100119901f [ 163.172677] FS: 00007fa3c5a12700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 163.173258] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.173694] CR2: ffffed100fffc000 CR3: 0000000016a98000 CR4: 0000000000350ee0 [ 163.174228] Call Trace: [ 163.174440] [ 163.174619] kasan_unpoison+0x23/0x60 [ 163.174920] mempool_exit+0x1c2/0x330 [ 163.175229] bioset_exit+0x2c9/0x630 [ 163.175536] disk_release+0x143/0x490 [ 163.175834] ? disk_release+0x0/0x490 [ 163.176133] ? device_release+0x0/0x250 [ 163.176440] device_release+0xa2/0x250 [ 163.176747] ? device_release+0x0/0x250 [ 163.177068] kobject_put+0x173/0x280 [ 163.177365] put_device+0x1b/0x40 [ 163.177638] put_disk+0x41/0x60 [ 163.177897] loop_control_ioctl+0x4d1/0x630 [ 163.178239] ? loop_control_ioctl+0x0/0x630 [ 163.178576] ? selinux_file_ioctl+0xb1/0x270 [ 163.178930] ? loop_control_ioctl+0x0/0x630 [ 163.179274] __x64_sys_ioctl+0x19a/0x220 [ 163.179603] do_syscall_64+0x3b/0xa0 [ 163.179898] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 163.180297] RIP: 0033:0x7fa3c849cb19 [ 163.180579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.181891] RSP: 002b:00007fa3c5a12188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.182455] RAX: ffffffffffffffda RBX: 00007fa3c85aff60 RCX: 00007fa3c849cb19 [ 163.182974] RDX: 0000000000000005 RSI: 0000000000004c81 RDI: 0000000000000006 [ 163.183494] RBP: 00007fa3c84f6f6d R08: 0000000000000000 R09: 0000000000000000 [ 163.184023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 163.184561] R13: 00007ffdd7beb5ff R14: 00007fa3c5a12300 R15: 0000000000022000 [ 163.185099] [ 163.185282] Modules linked in: [ 163.185528] CR2: ffffed100fffc000 [ 163.185794] ---[ end trace 0000000000000000 ]--- [ 163.186142] RIP: 0010:__memset+0x24/0x50 [ 163.186518] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.187873] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 163.188272] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 163.188801] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.189335] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 163.189864] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.190397] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 163.190913] FS: 00007fa3c5a12700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 163.191499] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.191913] CR2: ffffed100fffc000 CR3: 0000000016a98000 CR4: 0000000000350ee0 [ 163.237040] BUG: unable to handle page fault for address: ffffed100fffc000 [ 163.237672] #PF: supervisor write access in kernel mode [ 163.238077] #PF: error_code(0x0002) - not-present page [ 163.238480] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 163.239001] Oops: 0002 [#13] PREEMPT SMP KASAN NOPTI [ 163.239374] CPU: 0 PID: 5694 Comm: syz-executor.3 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 163.240107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 163.240729] RIP: 0010:__memset+0x24/0x50 [ 163.241073] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.242444] RSP: 0018:ffff8880381ffcc0 EFLAGS: 00010216 [ 163.242859] RAX: 0000000000000000 RBX: ffff88800a4a23c0 RCX: 1ffffe21fe593e01 [ 163.243397] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.243945] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001494478 [ 163.244473] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.244951] R13: ffff88800a4a23c0 R14: ffffffff815f27a0 R15: 1ffff110054da01f [ 163.245441] FS: 00007f3744e3f700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 163.245987] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.246388] CR2: ffffed100fffc000 CR3: 000000000ecc2000 CR4: 0000000000350ef0 [ 163.246897] Call Trace: [ 163.247087] [ 163.247265] kasan_unpoison+0x23/0x60 [ 163.247578] mempool_exit+0x1c2/0x330 [ 163.247894] bioset_exit+0x2c9/0x630 [ 163.248194] disk_release+0x143/0x490 [ 163.248504] ? disk_release+0x0/0x490 [ 163.248811] ? device_release+0x0/0x250 [ 163.249136] device_release+0xa2/0x250 [ 163.249449] ? device_release+0x0/0x250 [ 163.249729] kobject_put+0x173/0x280 [ 163.249997] put_device+0x1b/0x40 [ 163.250242] put_disk+0x41/0x60 [ 163.250494] loop_control_ioctl+0x4d1/0x630 [ 163.250804] ? loop_control_ioctl+0x0/0x630 [ 163.251108] ? selinux_file_ioctl+0xb1/0x270 [ 163.251427] ? loop_control_ioctl+0x0/0x630 [ 163.251732] __x64_sys_ioctl+0x19a/0x220 [ 163.252035] do_syscall_64+0x3b/0xa0 [ 163.252311] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 163.252672] RIP: 0033:0x7f37478c9b19 [ 163.252950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.254211] RSP: 002b:00007f3744e3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.254798] RAX: ffffffffffffffda RBX: 00007f37479dcf60 RCX: 00007f37478c9b19 [ 163.255337] RDX: 0000000000000002 RSI: 0000000000004c81 RDI: 0000000000000006 [ 163.255865] RBP: 00007f3747923f6d R08: 0000000000000000 R09: 0000000000000000 [ 163.256391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 163.256916] R13: 00007fff77369cbf R14: 00007f3744e3f300 R15: 0000000000022000 [ 163.257456] [ 163.257633] Modules linked in: [ 163.257879] CR2: ffffed100fffc000 [ 163.258134] ---[ end trace 0000000000000000 ]--- [ 163.258496] RIP: 0010:__memset+0x24/0x50 [ 163.258813] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.260128] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 163.260515] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 163.261037] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.261562] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 163.262072] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.262609] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 163.263143] FS: 00007f3744e3f700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 163.263732] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.264163] CR2: ffffed100fffc000 CR3: 000000000ecc2000 CR4: 0000000000350ef0 [ 163.343921] BUG: unable to handle page fault for address: ffffed100fffc000 [ 163.344447] #PF: supervisor write access in kernel mode [ 163.344793] #PF: error_code(0x0002) - not-present page [ 163.345137] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 163.345577] Oops: 0002 [#14] PREEMPT SMP KASAN NOPTI [ 163.345908] CPU: 1 PID: 5712 Comm: syz-executor.0 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 163.346523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 163.347052] RIP: 0010:__memset+0x24/0x50 [ 163.347345] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.348497] RSP: 0018:ffff88800994fcc0 EFLAGS: 00010216 [ 163.348846] RAX: 0000000000000000 RBX: ffff88800c019b40 RCX: 1ffffe21fe601bdf [ 163.349303] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.349763] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803368 [ 163.350229] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.350699] R13: ffff88800c019b40 R14: ffffffff815f27a0 R15: 1ffff110011fca1f [ 163.351160] FS: 00007fb2ebf1f700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 163.351682] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.352058] CR2: ffffed100fffc000 CR3: 000000000e878000 CR4: 0000000000350ee0 [ 163.352519] Call Trace: [ 163.352690] [ 163.352839] kasan_unpoison+0x23/0x60 [ 163.353084] mempool_exit+0x1c2/0x330 [ 163.353336] bioset_exit+0x2c9/0x630 [ 163.353588] disk_release+0x143/0x490 [ 163.353838] ? disk_release+0x0/0x490 [ 163.354084] ? device_release+0x0/0x250 [ 163.354341] device_release+0xa2/0x250 [ 163.354602] ? device_release+0x0/0x250 [ 163.354855] kobject_put+0x173/0x280 [ 163.355099] put_device+0x1b/0x40 [ 163.355322] put_disk+0x41/0x60 [ 163.355537] loop_control_ioctl+0x4d1/0x630 [ 163.355816] ? loop_control_ioctl+0x0/0x630 [ 163.356092] ? selinux_file_ioctl+0xb1/0x270 [ 163.356385] ? loop_control_ioctl+0x0/0x630 [ 163.356660] __x64_sys_ioctl+0x19a/0x220 [ 163.356932] do_syscall_64+0x3b/0xa0 [ 163.357180] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 163.357504] RIP: 0033:0x7fb2ee9cab19 [ 163.357738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.358818] RSP: 002b:00007fb2ebf1f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.359286] RAX: ffffffffffffffda RBX: 00007fb2eeade020 RCX: 00007fb2ee9cab19 [ 163.359712] RDX: 0000000000000007 RSI: 0000000000004c81 RDI: 0000000000000006 [ 163.360146] RBP: 00007fb2eea24f6d R08: 0000000000000000 R09: 0000000000000000 [ 163.360582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 163.361030] R13: 00007ffd4da655cf R14: 00007fb2ebf1f300 R15: 0000000000022000 [ 163.361476] [ 163.361627] Modules linked in: [ 163.361834] CR2: ffffed100fffc000 [ 163.362049] ---[ end trace 0000000000000000 ]--- [ 163.362340] RIP: 0010:__memset+0x24/0x50 [ 163.362619] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.363700] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 163.364031] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 163.364466] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.364900] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 163.365333] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.365767] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 163.366203] FS: 00007fb2ebf1f700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 163.366710] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.367068] CR2: ffffed100fffc000 CR3: 000000000e878000 CR4: 0000000000350ee0 [ 163.397624] BUG: unable to handle page fault for address: ffffed100fffc000 [ 163.398142] #PF: supervisor write access in kernel mode [ 163.398508] #PF: error_code(0x0002) - not-present page [ 163.398876] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 163.399330] Oops: 0002 [#15] PREEMPT SMP KASAN NOPTI [ 163.399679] CPU: 0 PID: 5718 Comm: syz-executor.4 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 163.400301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 163.400843] RIP: 0010:__memset+0x24/0x50 [ 163.401135] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.402307] RSP: 0018:ffff8880386a7cc0 EFLAGS: 00010216 [ 163.402675] RAX: 0000000000000000 RBX: ffff8880198d4000 RCX: 1ffffe21fe964a72 [ 163.403158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.403658] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed100331a800 [ 163.404148] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.404639] R13: ffff8880198d4000 R14: ffffffff815f27a0 R15: 1ffff1100338021f [ 163.405136] FS: 00007fc33f311700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 163.405689] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.406095] CR2: ffffed100fffc000 CR3: 000000001310a000 CR4: 0000000000350ef0 [ 163.406600] Call Trace: [ 163.406786] [ 163.406952] kasan_unpoison+0x23/0x60 [ 163.407230] mempool_exit+0x1c2/0x330 [ 163.407514] bioset_exit+0x2c9/0x630 [ 163.407787] ? _raw_spin_unlock+0x24/0x50 [ 163.408086] ? blkg_destroy_all.isra.0+0x157/0x230 [ 163.408448] disk_release+0x143/0x490 [ 163.408722] ? disk_release+0x0/0x490 [ 163.408991] ? device_release+0x0/0x250 [ 163.409278] device_release+0xa2/0x250 [ 163.409558] ? device_release+0x0/0x250 [ 163.409845] kobject_put+0x173/0x280 [ 163.410116] put_device+0x1b/0x40 [ 163.410369] put_disk+0x41/0x60 [ 163.410610] loop_control_ioctl+0x4d1/0x630 [ 163.410920] ? loop_control_ioctl+0x0/0x630 [ 163.411226] ? selinux_file_ioctl+0xb1/0x270 [ 163.411550] ? loop_control_ioctl+0x0/0x630 [ 163.411860] __x64_sys_ioctl+0x19a/0x220 [ 163.412156] do_syscall_64+0x3b/0xa0 [ 163.412426] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 163.412786] RIP: 0033:0x7fc341dbcb19 [ 163.413048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.414276] RSP: 002b:00007fc33f311188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.414797] RAX: ffffffffffffffda RBX: 00007fc341ed0020 RCX: 00007fc341dbcb19 [ 163.415280] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006 [ 163.415761] RBP: 00007fc341e16f6d R08: 0000000000000000 R09: 0000000000000000 [ 163.416255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 163.416748] R13: 00007ffdadf59f8f R14: 00007fc33f311300 R15: 0000000000022000 [ 163.417246] [ 163.417414] Modules linked in: [ 163.417646] CR2: ffffed100fffc000 [ 163.417890] ---[ end trace 0000000000000000 ]--- [ 163.418214] RIP: 0010:__memset+0x24/0x50 [ 163.418524] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 163.419716] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 163.420078] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 163.420556] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 163.421039] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 163.421514] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 163.421992] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 163.422487] FS: 00007fc33f311700(0000) GS:ffff88806d000000(0000) knlGS:0000000000000000 [ 163.423030] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.423424] CR2: ffffed100fffc000 CR3: 000000001310a000 CR4: 0000000000350ef0 10:54:39 executing program 7: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:39 executing program 5: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:39 executing program 6: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:39 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:39 executing program 4: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:39 executing program 2: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:39 executing program 7: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:39 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:39 executing program 3: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 164.552601] BUG: unable to handle page fault for address: ffffed100fffc000 [ 164.553242] #PF: supervisor write access in kernel mode [ 164.553696] #PF: error_code(0x0002) - not-present page [ 164.554121] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 164.554695] Oops: 0002 [#16] PREEMPT SMP KASAN NOPTI [ 164.555110] CPU: 1 PID: 5742 Comm: syz-executor.5 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 164.555881] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 164.556561] RIP: 0010:__memset+0x24/0x50 [ 164.556912] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 164.558362] RSP: 0018:ffff888038a0fcc0 EFLAGS: 00010216 [ 164.558803] RAX: 0000000000000000 RBX: ffff88800a4a29c0 RCX: 1ffffe21fe593e19 [ 164.559384] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 164.559963] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001494538 [ 164.560544] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 164.561124] R13: ffff88800a4a29c0 R14: ffffffff815f27a0 R15: 1ffff1100703c01f [ 164.561707] FS: 00007f92b7870700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 164.562356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.562837] CR2: ffffed100fffc000 CR3: 000000000f210000 CR4: 0000000000350ee0 [ 164.563403] Call Trace: [ 164.563628] [ 164.563825] kasan_unpoison+0x23/0x60 [ 164.564141] mempool_exit+0x1c2/0x330 [ 164.564470] bioset_exit+0x2c9/0x630 [ 164.564788] disk_release+0x143/0x490 [ 164.565115] ? disk_release+0x0/0x490 [ 164.565433] ? device_release+0x0/0x250 [ 164.565762] device_release+0xa2/0x250 [ 164.566084] ? device_release+0x0/0x250 [ 164.566428] kobject_put+0x173/0x280 [ 164.566753] put_device+0x1b/0x40 [ 164.567043] put_disk+0x41/0x60 [ 164.567330] loop_control_ioctl+0x4d1/0x630 [ 164.567683] ? loop_control_ioctl+0x0/0x630 [ 164.568037] ? selinux_file_ioctl+0xb1/0x270 [ 164.568413] ? loop_control_ioctl+0x0/0x630 [ 164.568766] __x64_sys_ioctl+0x19a/0x220 [ 164.569110] do_syscall_64+0x3b/0xa0 [ 164.569426] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 164.569854] RIP: 0033:0x7f92ba2fab19 [ 164.570160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.571578] RSP: 002b:00007f92b7870188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 164.572186] RAX: ffffffffffffffda RBX: 00007f92ba40df60 RCX: 00007f92ba2fab19 [ 164.572756] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006 [ 164.573320] RBP: 00007f92ba354f6d R08: 0000000000000000 R09: 0000000000000000 [ 164.573880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 164.574456] R13: 00007fff4d3d320f R14: 00007f92b7870300 R15: 0000000000022000 [ 164.575029] [ 164.575217] Modules linked in: [ 164.575484] CR2: ffffed100fffc000 [ 164.575769] ---[ end trace 0000000000000000 ]--- [ 164.576145] RIP: 0010:__memset+0x24/0x50 [ 164.576482] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 164.577861] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 164.578289] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 164.578858] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 164.579424] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 164.579989] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 164.580546] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 164.581122] FS: 00007f92b7870700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 164.581749] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.582218] CR2: ffffed100fffc000 CR3: 000000000f210000 CR4: 0000000000350ee0 10:54:40 executing program 1: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:40 executing program 2: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 164.937312] loop2: detected capacity change from 0 to 40 10:54:40 executing program 6: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) [ 165.029624] syz-executor.2: attempt to access beyond end of device [ 165.029624] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 165.030782] Buffer I/O error on dev loop2, logical block 10, lost async page write 10:54:41 executing program 5: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:41 executing program 7: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:41 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:41 executing program 4: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:41 executing program 1: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:41 executing program 2: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 165.187595] loop1: detected capacity change from 0 to 40 [ 165.305109] BUG: unable to handle page fault for address: ffffed100fffc000 [ 165.305673] #PF: supervisor write access in kernel mode [ 165.306050] #PF: error_code(0x0002) - not-present page [ 165.306431] PGD 7ffd3067 P4D 7ffd3067 PUD 7ffd2067 PMD 7ffd1067 PTE 0 [ 165.306908] Oops: 0002 [#17] PREEMPT SMP KASAN NOPTI [ 165.307276] CPU: 1 PID: 5767 Comm: syz-executor.6 Tainted: G D 6.1.0-rc3-next-20221031 #1 [ 165.307921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 165.308519] RIP: 0010:__memset+0x24/0x50 [ 165.308838] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 165.310100] RSP: 0018:ffff88803af7fcc0 EFLAGS: 00010216 [ 165.310500] RAX: 0000000000000000 RBX: ffff8880198d4300 RCX: 1ffffe21fe964a7e [ 165.310992] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 165.311480] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed100331a860 [ 165.311983] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 165.312481] R13: ffff8880198d4300 R14: ffffffff815f27a0 R15: 1ffff11006de2e1f [ 165.312981] FS: 00007f3743709700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 165.313546] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.313927] CR2: ffffed100fffc000 CR3: 00000000178f2000 CR4: 0000000000350ee0 [ 165.314457] Call Trace: [ 165.314654] [ 165.314823] kasan_unpoison+0x23/0x60 [ 165.315130] mempool_exit+0x1c2/0x330 [ 165.315440] bioset_exit+0x2c9/0x630 [ 165.315750] disk_release+0x143/0x490 [ 165.316056] ? disk_release+0x0/0x490 [ 165.316347] ? device_release+0x0/0x250 [ 165.316648] device_release+0xa2/0x250 [ 165.316946] ? device_release+0x0/0x250 [ 165.317253] kobject_put+0x173/0x280 [ 165.317542] put_device+0x1b/0x40 [ 165.317806] put_disk+0x41/0x60 [ 165.318071] loop_control_ioctl+0x4d1/0x630 [ 165.318419] ? loop_control_ioctl+0x0/0x630 [ 165.318741] ? selinux_file_ioctl+0xb1/0x270 [ 165.319094] ? loop_control_ioctl+0x0/0x630 [ 165.319430] __x64_sys_ioctl+0x19a/0x220 [ 165.319741] do_syscall_64+0x3b/0xa0 [ 165.320031] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 165.320430] RIP: 0033:0x7f3746193b19 [ 165.320722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 165.322032] RSP: 002b:00007f3743709188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 165.322638] RAX: ffffffffffffffda RBX: 00007f37462a6f60 RCX: 00007f3746193b19 [ 165.323172] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000006 [ 165.323699] RBP: 00007f37461edf6d R08: 0000000000000000 R09: 0000000000000000 [ 165.324229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 165.324759] R13: 00007ffca3fbd50f R14: 00007f3743709300 R15: 0000000000022000 [ 165.325307] [ 165.325480] Modules linked in: [ 165.325725] CR2: ffffed100fffc000 [ 165.325985] ---[ end trace 0000000000000000 ]--- [ 165.326337] RIP: 0010:__memset+0x24/0x50 [ 165.326658] Code: 90 90 90 90 90 90 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 e9 4d d4 12 00 66 66 2e 0f 1f 84 00 [ 165.327982] RSP: 0018:ffff88803a1dfcc0 EFLAGS: 00010216 [ 165.328374] RAX: 0000000000000000 RBX: ffff88800c0190c0 RCX: 1ffffe21fe601bb5 [ 165.328907] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffed100fffc000 [ 165.329453] RBP: ffff88800c035c80 R08: 0000000000000005 R09: ffffed1001803218 [ 165.329990] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800c035c80 [ 165.330528] R13: ffff88800c0190c0 R14: ffffffff815f27a0 R15: 1ffff1100112341f [ 165.331048] FS: 00007f3743709700(0000) GS:ffff88806d100000(0000) knlGS:0000000000000000 [ 165.331657] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 165.332094] CR2: ffffed100fffc000 CR3: 00000000178f2000 CR4: 0000000000350ee0 [ 165.372255] syz-executor.3 (5745) used greatest stack depth: 23856 bytes left [ 165.429682] syz-executor.1: attempt to access beyond end of device [ 165.429682] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 165.430908] Buffer I/O error on dev loop1, logical block 10, lost async page write [ 165.977135] loop2: detected capacity change from 0 to 40 [ 166.085949] syz-executor.2: attempt to access beyond end of device [ 166.085949] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 166.087287] Buffer I/O error on dev loop2, logical block 10, lost async page write 10:54:42 executing program 3: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:42 executing program 6: shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) r0 = shmget(0x3, 0xa000, 0x20, &(0x7f0000ff6000/0xa000)=nil) shmget(0x0, 0x1000, 0x20, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000fe9000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f0000fe6000/0xe000)=nil, 0x9000) shmctl$IPC_RMID(0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) shmat(0x0, &(0x7f0000feb000/0x3000)=nil, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x149, 0x7}, 0x10601, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r4 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r4, &(0x7f0000fed000/0x1000)=nil, 0x0) openat2(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x40200, 0x1e1, 0x1b}, 0x18) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) 10:54:42 executing program 4: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:42 executing program 0: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:42 executing program 1: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:42 executing program 7: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:42 executing program 5: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 166.152121] loop1: detected capacity change from 0 to 40 [ 166.156289] loop3: detected capacity change from 0 to 40 10:54:42 executing program 2: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 166.266297] syz-executor.1: attempt to access beyond end of device [ 166.266297] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 166.267343] Buffer I/O error on dev loop1, logical block 10, lost async page write [ 166.279639] loop2: detected capacity change from 0 to 40 10:54:42 executing program 6: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:42 executing program 1: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 166.370275] loop1: detected capacity change from 0 to 40 [ 166.432649] syz-executor.3: attempt to access beyond end of device [ 166.432649] loop3: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 166.433696] Buffer I/O error on dev loop3, logical block 10, lost async page write [ 166.463895] syz-executor.1: attempt to access beyond end of device [ 166.463895] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 166.464913] Buffer I/O error on dev loop1, logical block 10, lost async page write [ 166.501631] syz-executor.2: attempt to access beyond end of device [ 166.501631] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 166.502669] Buffer I/O error on dev loop2, logical block 10, lost async page write 10:54:42 executing program 3: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 166.598740] loop3: detected capacity change from 0 to 40 10:54:42 executing program 1: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 166.653362] loop1: detected capacity change from 0 to 40 10:54:42 executing program 2: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 166.795696] syz-executor.1: attempt to access beyond end of device [ 166.795696] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 166.796799] Buffer I/O error on dev loop1, logical block 10, lost async page write [ 166.944041] loop2: detected capacity change from 0 to 40 10:54:42 executing program 1: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 167.155443] syz-executor.3: attempt to access beyond end of device [ 167.155443] loop3: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 167.157533] Buffer I/O error on dev loop3, logical block 10, lost async page write 10:54:43 executing program 0: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) [ 167.175049] syz-executor.5 (5804) used greatest stack depth: 23592 bytes left [ 167.194337] syz-executor.2: attempt to access beyond end of device [ 167.194337] loop2: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 167.195386] Buffer I/O error on dev loop2, logical block 10, lost async page write 10:54:43 executing program 6: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:43 executing program 7: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:44 executing program 5: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:44 executing program 4: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:44 executing program 2: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:44 executing program 0: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:44 executing program 3: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:44 executing program 1: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:44 executing program 6: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:44 executing program 7: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) [ 168.195694] loop1: detected capacity change from 0 to 40 [ 168.238526] loop2: detected capacity change from 0 to 40 [ 168.301401] syz-executor.1: attempt to access beyond end of device [ 168.301401] loop1: rw=2049, sector=40, nr_sectors = 4 limit=40 [ 168.302362] Buffer I/O error on dev loop1, logical block 10, lost async page write 10:54:44 executing program 7: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:45 executing program 3: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:45 executing program 7: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:45 executing program 6: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:45 executing program 4: io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x301c03, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file2\x00', 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) write$binfmt_aout(r3, &(0x7f0000000340)={{0xcc, 0x5, 0x5, 0xdd, 0x24c, 0x7ca, 0x1dc}, "4153ea8be896e502f55e270ce86a0dc9bd8e0fce0dad337feb82e33b59e65a9313390bf613013544e2a79f587bef4b2c6529f274b28816b826948d55912e6e5d0b93d9e8f68804b3ad151bbfdc6ff29988d70111c487529215ae55201124c09b2c47f2022d1184c443bf3e438916fb8a26c4a8c4599e379a2a91181d3ccbf91279978975e40645ad7e748c02edee87a648308880f9b506cf", ['\x00', '\x00']}, 0x2b8) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r2, r0, 0x0, 0xfffffdef) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000040), 0x4) 10:54:45 executing program 5: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:45 executing program 2: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:45 executing program 0: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 1: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 5: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 2: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 3: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 7: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 0: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 2: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 7: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r0, 0x10, 0x4000, 0x7000) 10:54:46 executing program 1: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) 10:54:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) fallocate(r0, 0x10, 0x4000, 0x7000) 10:54:46 executing program 6: semget$private(0x0, 0x2, 0x204352dc6d986c9c) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x80, 0x3f, 0x7fffffff, 0x0, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)=ANY=[@ANYBLOB="017100000180000018000000", @ANYRES32]) getpgid(0xffffffffffffffff) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x8, 0x3, 0x8, 0x6, 0xfffffffffffffffa}) VM DIAGNOSIS: 10:54:37 Registers: info registers vcpu 0 RAX=1ffffffff0a4bc63 RBX=0000000000000001 RCX=0000000000000000 RDX=dffffc0000000000 RSI=ffffffff847edc00 RDI=0000000000000000 RBP=ffffffff847edc40 RSP=ffff8880163c7b10 R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000000000 R13=ffffffff847edc00 R14=ffffffff817b253c R15=ffffffff8525e2a0 RIP=ffffffff8436f67a RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fab578cf8c0 00000000 00000000 GS =0000 ffff88806d000000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe1947b22000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe1947b20000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b30b25000 CR3=000000000dc50000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=00000000000000b100007265776f702f XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=0000556a47fa47a00000556a47fdcc50 XMM06=00000000000000000000000300000000 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000200000000000000020000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82451091 RDI=ffffffff879a19e0 RBP=ffffffff879a19a0 RSP=ffff88803a1df488 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000030 R11=0000000000000001 R12=0000000000000030 R13=ffffffff879a19a0 R14=0000000000000010 R15=ffffffff82451080 RIP=ffffffff824510e9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f3effbfb700 00000000 00000000 GS =0000 ffff88806d100000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe55a1948000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe55a1946000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=ffffed100fffc000 CR3=00000000367ac000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=696e656420737365636341002f737973 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=0000556a47fef8300000556a47fc9890 XMM06=0000000000000000ffffffff00000003 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000200000000000000020000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000