7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0x6) 18:35:39 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 418.786278] FAT-fs (loop2): Unrecognized mount option "./file0" or missing value 18:35:39 executing program 1: fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2, 0xffffffffffffffff}) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200000000) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x2, 0x1, 0x3, 0x5, 0x0, 0x10000, 0x41000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x1, 0x1}, 0x800, 0x400, 0x3f, 0x8, 0x7, 0x1f, 0x0, 0x0, 0x944, 0x0, 0x6}, 0xffffffffffffffff, 0xe, r0, 0x8) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') lseek(r1, 0x7, 0x0) pread64(r0, &(0x7f0000000300)=""/125, 0x7d, 0x7) readv(r2, &(0x7f0000003700)=[{&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000014c0)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}, {&(0x7f0000003640)=""/128, 0x80}, {&(0x7f00000015c0)=""/51, 0x33}, {&(0x7f00000001c0)=""/57, 0x39}], 0x8) readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) pread64(r1, &(0x7f0000000100)=""/128, 0x80, 0x276) 18:35:39 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) flock(r0, 0x4) r1 = getpid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1f, 0x3f, 0x7, 0xff, 0x0, 0x0, 0x4, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000140), 0x4}, 0x40948, 0x8001, 0x81, 0x3, 0x7, 0x5, 0x3, 0x0, 0x9, 0x0, 0x80000001}, r1, 0x10, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19"]) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) 18:35:39 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x4}}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='.\x00', 0xffffffffffff5f71, 0x4, &(0x7f0000000300)=[{&(0x7f00000000c0)="0e202c14af68befd22e5db5e92b5da74dc840c2d78a93c6174666242e0b2ea44b265aebda7ff4f89a2ab3cd8b4914928e72723e5c7c8ba0514c53835927d23417e08c448d25ff0e8d3804e42064d4fba87b1e8c88d478f75bb5037bb62114ba34bd5955c6d54203d19a48f9fa24bd87759e91037229c4f804f63ce5010e9370ecf062acf3d9540c239c9", 0x8a, 0x2}, {&(0x7f0000000180)="78ae27edb7f78a695ffe294214c893cc71a479a9eb7051c06c5ca2e88e2b2a9f9c0ebc236c6b269eb2bb46d8f66a28355f3b56e13590409e22073b81749c84", 0x3f}, {&(0x7f0000000200)="e9a0a51a6bcf37eb26f5f38b3c", 0xd, 0x6}, {&(0x7f0000000240)="db60018881b0f6ffa2387a67566f289ae300b70ae24771dc4c9d92627d70e685742078f31c568830a1204725fbd20613b71cf0ff845e69fe46ee7d0879fc31ebc551c7e7987f7652459736d34b76fe628f8313154d9f36cf4c7632c961b2e03719b67d657eb013873715afd23386319df1fb7fb7aedb100c312cccbb209af565642d99a30b12107957dfa2335d6aa90d6a950e06a3df96be4b9c7a9c681fbd18158542d108f477791ad482371a9a4297774853eb0c04780e982362388abc", 0xbe, 0x7}], 0x42000, &(0x7f0000000400)=ANY=[@ANYBLOB="73686f727c6e616d653d77696e39352c756e695f786c6111481bfc2c646566636f6e6f65645f752c004f8c1d469aa952dfeda93823cfe20a9f8bc3dc1430d3a5080e8b4831ce178c28eeee1298d7cd9f45037b470000"]) [ 419.553795] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 419.556047] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/26/file0 supports timestamps until 2038 (0x7fffffff) [ 419.725301] EXT4-fs (loop6): Unrecognized mount option "" or missing value [ 432.255189] kmemleak: 42 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 18:36:00 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:36:00 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:36:00 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:36:00 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x5, 0x0) io_setup(0xffffff7f, &(0x7f0000000100)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x80, 0x7, 0x8, 0x1, 0x8, 0x0, 0x8, 0x8001, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x10000, 0xffffffff7fffffff}, 0x12003, 0x80, 0x400, 0x6, 0xff, 0x8, 0x7, 0x0, 0xffffff78, 0x0, 0x9}, r0, 0xb, 0xffffffffffffffff, 0x3) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) io_submit(r1, 0x7, &(0x7f0000000980)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x7ff, r0, &(0x7f0000000440)="bb36e605855e209ddd2792d34223c58b7b84aa15ad43f628e384c9fb9ca2142262be261ac89d525ffaecf6196c131d2782f1d23e88f535a8bcb2ea626d1fc4ab478454be8049b8b842742b8bf21c125749d54310219778751ee8ca401011bb7f4b91da36e1e13dbea9bc75fbe3b8ec62d79203f4dcb77ca757d729a8204f9bd7fc83d978fed45611f16dafb2048fd901bdee9fff01694e1ea8101af235c729f918362eb35acb2dd7135415a514209f0684bb583204bf1377b01628a737ac7fff9c74393465e4bfd65d25aa939d", 0xcd, 0x3, 0x0, 0x3, r0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000540)="a60292ff16c738d5d20f59b19ab8d6a40539fc26b5721a3eafa4822e532b5d6f9b1c4da14c46fe8a14e9fc04365752ed061a83eff9feb99d3971efbe49a23a21808916d5cf5d19fa622ded9184b485ffa5c1bda5be3a8b8d2f1a740e80111c042d4cb6930aa580f2179e44fe2af0086b9ea6c7f9f46d59cd754a6801c7df9eb13ae23817bbeca9e4f66238f8e3dff73b137de31898f69745022763bc619e534f83f747c32b6b96026a4ba649ae0a932864e7e392966ca8970663a5fc859edb82a40534", 0xc3, 0x25, 0x0, 0x1, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x6, 0x7f, r0, &(0x7f0000000640)="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", 0xfd, 0x7, 0x0, 0x1, r0}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x81, r0, &(0x7f00000003c0), 0x0, 0xae, 0x0, 0x1, r0}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x1, r3, &(0x7f0000002100)="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", 0x1000, 0x80, 0x0, 0x3, r0}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x8, 0xfffa, r0, &(0x7f00000007c0)="b96543ad13eacd377d0ae96927d7d3240d12c14f874d48e293a52bb316c4353fdac87609a4008c4fdb9d4efaecf71427ed33dbeef7393a3c421a0e8d603325afcd6c3ca05326fffd45bb9c4e1d3c3ebde53973c7cb7e47d4f20d2d729a0f6ef55cecc7d51a1cb0339bfeb9dda60c59008f13e4191a05e05c090e455befeceee3943d63f80750fbc8874a009250", 0x8d, 0x4c7, 0x0, 0x0, r0}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x8, 0xea, r0, &(0x7f00000008c0)="c4def62e1a3dc133be230e9cf07b50029cf74ba03acfe5530101f45fe289362f5ded4a7aa5c085f2eb47a17f86588b3f7743c16a406b193b567c663d7bafd63e1d04128e97514f0aeae2c9e7e6b8b3689eabc7daaf7d74e5fb", 0x59, 0x1000, 0x0, 0x2}]) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) fcntl$getown(r2, 0x9) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt_cache\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r4, 0x80404532, &(0x7f0000000280)=""/209) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0xbb70, 0x7, 0x9, 0x7ff, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:36:00 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder1\x00', 0x800, 0x0) flock(r0, 0x6) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x8c, 0x0, 0x300, 0x70bd28, 0x80000001, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:udev_rules_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr=' \x01\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x27}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x9000}, 0x40000) prlimit64(0x0, 0x0, &(0x7f0000000240)={0x7, 0x8001}, 0x0) fork() ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x3f}}, './file0\x00'}) 18:36:00 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r1, 0x10, 0x0, 0x1000002) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000140)='.\x00', 0x0) r2 = accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000001c0)=0x14) readv(r2, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000300)=""/108, 0x6c}], 0x2) r3 = syz_open_dev$loop(&(0x7f0000000180), 0x1, 0x20000) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f00000003c0)={{r3}, "e1d1a670996f628ebc2b250da4db6f24dcdf6d72a31953a285af5ef534c9c0be9926cb601ea018861043b3e67c80ce30f1dbdf8fefd582eb96792c08437799ff0df98a3a7024e44c8c16b8a4ca3f4dcc7d1d4997f6c9938616378654f60cca0b83c050fa76d98f982f7b8df2ac4a0223c6421818a8fd652737a7407561ce41ef6000cc820739f6ea964361d17449acbffbffb2e53be4d756357c1f7eef8bcb6456c486ca04b52b0db69e913faef4e13a4326bf42ba3c43cf72b0d18d5fcc2ec222da45931ffa5509e5fad63b032bb461fccfda1d7a8b18dd719e6e7dc76d61e98db128437044bcd41e4cc31a21f10569617076ba50fbaef09100ad44bf82a500076dc51e1105ab819652b102f2121c00929fd0e9bc667430306c11e6affd1a45932f6ffb3d66d95aa17e3026984221030025d6f8938528629430d9003f4afd7d2ef72fef20703ac36ae60ea3bca0eb5d3fa730d3d00e5aa488b7c25389b018891c9b40daacf2633065e53bfb4c90f8f1690ca7055a56e442739dc0a24d8a190177fb1f893825984b57350163dd07a8aa944cbf1c00ea941c9ef91149a2e7f19e97aec8bbc9535da717eb62b68844049cbfb23520280dcbcc052d157143c1c9ae975d94685020166757fa206ad8888b3163a11d3410129f060126665c6770d431d814311f9641929edc348085928b8ed90c8036607a5d1c5bf04c14284ab89c689e32882750d0b704adf9e2a2767fceda3580d1caa91acf0bd8691012d3c0fe47145ab12bbcaa6e7ef28f61ca11a99104cf0d264126eb3fd6aed6ebb8487133c43b4992eb88ca7082aa083b4309496c4b5b569882f75111f5e742a364fed086cd2ee518c942339c16cfaec4672ef8d4f5698a0de4f30094e9e0c3db6fc40c4e9118346dc6a572ddf48527833c221cbb0bdd578b0f5fbb112ec4843e44db7706b5a31f862f40e4362132579edb88efb46fbce146bf855cda74df9d4059c35250885d0facabfab8a5fa489220c2bc45e58ff1af753d66b6474e0f977082381a78eb313024256e07fc354963f8dba5132fcf308afa6c046d97c81afcb26f115df0e59e934b3b15a56ad3fa828bc31c2bf3df8f5e744364939f2ab57e87426fa442f0b47b13f1c5ff24b506afa4133d8722fa16ef782bb7d588df1d610c293773921fb6f8509785e2bf5d2372f00ca94dda9435b204e3e637bb0182584cfbc6af4a73b82075aa87a3d2a848994595771ad1196cffcfd52fb764cd83e1947464483d6724d9854b4acd5a356810ea73b1e60f4fb7ee2c014cced571255e28c2872099e9030c47ab7f997e7b15d327fbe4c6d4455dd4f2563d9a88bfd8f5aa278ca179d00afdbbf3b1e98d3f591a988ce9bc44ba9405140702defa199808346e4dd6465d8b1139ae62fe019f8310fa4e89e0c40d37f04c240f02239b2f5bac9bc297b2c67ef946c3c06115aeb47db33bb416faaf97d3b37448e1726f010ff4ce84e6da8a3c23c7c5637afaf724d5e85fcafad5a692d2b02403640526dc6c0c0b8312b9fa0f470f0e6d4a7365139de79eb4c64d9fa0ec59cbf4a23eb0aa379a3ac445b579c7bdda55b39e3c68fb65fbc27a948980f38aeb1fc557aeab1158ac18557562e6741e2a8c809e36565ce4aba61df64d0d754b1aab368aa4080c53c932e5e5ab4b9949dab5ccbc517f7a60a1320cf36cf5409b8e3ffd908f66beb83725cb6b93032b769e358adab1586e9d5cd81f6096e35b17e1aff346d36d0335895d99384e5dee02cbba79dfd27f401b44578b08e123b516209869732dc623c254d5c59096682cbd208d09462356f2cd37358a76066fa7c5b8cc209ad5f44bf4d6768d049e57bf447ead2ceedcba0221d2b1136a75cc39b2602d7babc80a8e9458217943e607d6b6f71e2b00994e89d448b21fb3e2e98509b4137c04128e62c60cf8fca4abeb32eb286f705e76383235fab766b72544d83b013ee953c8f1e782a76a67bd853efb067bb01ee90db45bb66ce9a0787078d5ec4ae261087e53b8680de219af160306c6e2a08ef5e8c77afc60727fc079e0fe9e2dc1ec87bdd3d8c75b67e157662515b64616e2cf38d700034daf409d840002fb4bcdeceea734390311c1215dc7bbbce1632c7c4d7b3b7eeda83b43a987054c1b0317894f51f7de68decc7824f2e430fcc2a032e8ef42994bbd399c99d6f43c1f145e289206fb4b9cf4c3d60447116c63b969b5adda2f0ee481bf32d1be335cd44b818b270774c337901f875ac700dd7360c32b7c4a4c1a89e2e1013d501df823db06204f9bc8aa36700a49d17961e2cbcd747591b2c70c1502c00ef65443bee6607050e2ce774726047f9d414261689f0064b9e34aedc7d0e272653d641710ab2a7f14240fe92167c1effc597280c0e5fab72cd46e92f09f07c2a8664eb6f05f91d743cca592fe153725b83439409ed8f3e05f28f0b938d38ad6fc6ad75aaf01d50c6e917b4a30ac1ca325a383f81f2d87cb6c22440319e4a92eb86e6a3d06d78c99b62055888f471f8d20eef5214f26d0cfd4dacecb58809bebbfe4193280bf3bbf31c24fadfbd17189a4309c026ada559e38d9ea7499a87514236de7a3284e13acb0891bde6498411af8812fad35288fc5605ea7488f088f1b27697d7c16fe0bca3758436e0e6f5fa87298a67ddb18b0e44d44a58e96e16bfa81504021279b97ed0f4b85febbe28b8fc4ac4e13873d938c5e2c9dd1981ad818e9120d7b14c9cc7b0f82eed9821ff15bb54b443bce07c9567fae7399be6a1ae1a3de43f88974f877bc3f63d059fc970466545181a218ce0236b904d8c8f9cc9edddd79127c9f17dc34281ad73be03df19481a8d2602bb1f4f67b46d6009c96bc1c951b59e56910e8d4ea76fd6c26c7c2dece727003e9781b8f9ee7d085f0ba9f4d9acef3bf7ce7bc5692ada793b3e87c4226092fe9c7d61e8f699a4fb14980b22629319ffdb6a8418de00e2477aa699671eb28a4848c7a8ff92bc499cb0dd484c47f867bc8383f1814b15585b06ed40740194eae79d89f3eb2269bdcbacca8fb41488ce29cf076d8775340f12a8aa442ffc961ad85e0054d9be97a94e33da2be6183e0abe8d2be1fb366a0600829396072b113ebee748df8f85ace08626501f39906693c5eaa0eeaa51b761dcf2e7463b31c3f26c356e96d086e066fe55bbca6fbba97106702891ee404304cffcc7869e01f3fe2b27d03d0c07e15e2a71d52a32ef898b97e8babc6180664683ec28c92168f16db3ee0213cbd437c669c74e870292d8562d094c0bbe73531e6e5bc1572d387db6cccb25d47e5464be67a1d8ae4e61a80b931bfd344af0ab4cafccdeca555aa2250cd84821464d2e3280921d82205dc292f7b112531b04fb454e1eb9af473b9a0d6a1980713f2e37dad064b5a94ec594ccf6eb498d00002d496ad2b554d2cde4af7bdf18fafb261c8d999a09fc8afe76c8afb988cb5d6b6c8df2d24589a3f903015d377971f7d5bae3069984460c9f02d2aeafa3ec4503bc9dd77c20d748b3f8345550f8f5c2e4ba90cfe3b29f6b4f43e66c15b44f8b88e6dc25271eb815349ce1e4dfb8fe74b82d6c966d7e4627ced9b53ab7ff91352ae579802987907ef733367c147e12b748b9f23d258a32f715a879f503657dd7c2014d56234784fc47bae287a9e96f675ec0df9dfb25bf2504d9a580ce38f9170ff1e87c7b80f1f658fede1e5e2b3c9c0f6e1b466938a083b700307badd6c57ffdacf504ed0e3b7f1774c2c18f32cb5d0982039449c8ae88f41ac605289555ea5a08a1161eec89cbbf589359744d3273a9a5185df2ede7c765d7d47ae65331c8fc1864083033711b4d88bf016752886e19b5094ec01a91c1ac60bf94e138facd0d3e05f9f3d9f847a189fa6038939f1ebec1883aa1fbd4fbc18222036cbe806b06e3cd497a37d28bf16a1c346c6a8dfe2332350fff5304c0533f4b7f00c1a434eece3dff3a03757138fd98ac83877f16e21b6bafd048b120e59af9211cf318746eba86f5247bc564cb1804af639a4604c8390fa311fda730a5b8b162b03bd7bfba6390dc5571b3b11902f4cd50fb34f1086e2c5a4195b3e17fe486b6c90a9cccf255e1f76f325a198514c41e8db1a2a9a7c416bc537400de476da1dc1d9af14ea017e06f6590f5e706bae7812b0d13aa5f187042eecd3afb73bafbbf46a898231ee654e53ccd3332699ae4bcc307a98ee73e98f615c253ceddd0707013ca7d9d695ef327f87f61cd5bb9cad915627828f4e81e7abf9d28bdec6e70d5b9b593af3bf83c5af006dea2d070fdf12c67b9a687848d574376b2d102ca09c5cd37b7f96aa125075578f70dd3649c82e882b989efc1c4c773700014740b9c38507fcc82d38ff2e7c0a781752919f04a1a02c60d2f0f8a7aa7b3d714a8a1741a53a325deeb945e26b1ca12dbdd979d811baeb09fed26f9fe4aaba9829ace4dbcbce2306fd681ee55e1e204ab14a650ab24ebb1d586f4830781a2397fb1ff19c783fb8964baf52a39f3d870488929e54bc57d02400f8fa5eb8514c5fac0ac3ba5ba141413ac3784ebd3e0b383ea41d949da834497913a2cce1ddd50fa42aa0682838887a73bdc4385f451316b33a0920fa2ef17771f6ce34ce0a70865e811bef37e6b4cd221a5fe3d573968d8168fb7f512ec293d5454563f48d7de348ab4fbe4546e20a5beeb8cbd8ab4820069b1db71284595c1ae73eff511e73aa37e92f97dbbe34fc6b7f5bbb8a16bb7a19e6e7bd4cbef8e8b445bba94e3a5a352f74b2d5d089a7dccf0ec4904a28a4fd87ec4e5e084e1a1591110a45d79c68a660b2906ae52cfe39f5e1b1633f1c01cd270237ac1343c09227b4221ce9ea312fa461dd77d9e4d6020901de9a7834706f487b69e7d61d9f041adba983c37ab1916013a9ca587ad3cbca3905c0b6d38c5df0db5799ca0ff151c81c891d67187c2337870f8a254775046ed73219bf077e6d61f16c8944426323f6b429896fa052f78d8d57caf9aa42dc79f0fcc48dde69e0f10cfa2e9f08205abea91f8ed0a8224dc93023f0e9dbb1f4813a939830c8c1a37cf6f61befc0ded17e457d1a27fde835fd0da21ff3b95d2ff20a1abe86483b4865d397c0ee0240c44aed6606b55da29a4001f34258a6f8eca7370b6baabb25873d3f54c49b4b240f5417e439c7b656b42a2888ab3284cdb0c0a3627f9d670d46dca97abef310c49c36122e289a401d490de1c6bcb3100bedca27e39f27620183c043667e180644a8f301a88815b6a6bbfa60bd0f22097a8ebe60be149f64a76e6adaecba844483d19d3ad9ea6b706bb60ad4b72367ee16efb9e602e83b88632e6e9c91c2d9e165cd73b608ab33e39e7a8c538ee4c8fdd9aed24858c9c6f6a5da8a2ce21322c9ce43d4744eb516d93e16ebb5c756cfe14a5b1e36f7dccddbe161f1e6c5c1981e242a072406757505d766ce1d5f1e54773a528f427ddc5f3b149b6f072d9d4de531cf26c03ee9c9f6ce99ca80c3cea7a2cf62deaad03c7a4bea23023c8045701a39cd31ec9bfff9279e6d338cfd990a7e567ffd0de2bde50fd65c5047df9b2f8be1e898ffa2b39e101144300b41567d270c301b91cdb93f56bb372ff59e137aacf8c03286d131da819731f873183608bfe214b7b892f3b1bab32da749bfc65d3c1e0ba0c8a596b1080b0820fa45d1e7827e78b34f9d19076c3d93b94280ca6627803ea3dc02ebd26cb7078f4b146ba7afe46ecf515180e0a452e6f6f63a64026802f3897bcc1b43778805ee33f63b8df695987dda3405"}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) open(&(0x7f0000000040)='./file0\x00', 0x1a18c1, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x2, 0x1000002) 18:36:00 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup2(r1, r0) sendmsg$nl_xfrm(r2, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000000500)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@mcast1}, [@mark={0xc}]}, 0x34}}, 0x10) 18:36:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) unlinkat(r0, &(0x7f0000000000)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) lseek(r0, 0x800, 0x4) pwrite64(r1, &(0x7f00000001c0)="b3", 0x1, 0x8000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) sendfile(r1, r0, 0x0, 0xffffffff000) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) lseek(r2, 0xcc8, 0x2) 18:36:01 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000380)={&(0x7f0000000540)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4, 0x4, "f215362b81a8899beddc9152671c79258c79070c03f069620386549c75300650e6e08c44064573eaa1a01cb3302edb572010536b34f2ce3e27ed86b08b0df2e3099f5f856529af11436442bafa8e90f61026df4c8f449cf55626bd6ded1cf58554a8e56059da4795a0a555faf101e931b48d151bc084e1e12534f799632f84d9934f83ddc7bad24ac270f6d6ca6ec6745fda5d70f06da0906282c9fdc29d7c0492899fe98a9e839c3e32fd1f"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x2c}}, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat$incfs(0xffffffffffffffff, &(0x7f0000000280)='.pending_reads\x00', 0x8000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000100)=@caif=@util={0x25, "441fa7d9adce0d7f5b92087dcd4aedcb"}}, 0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_READ=@pass_buffer={0x16, 0x3, 0x4000, @fd, 0x63e, &(0x7f0000000400)=""/249, 0xf9, 0x15, 0x0, {0x0, r1}}, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_WRITE={0x17, 0x3, 0x2000, @fd=r2, 0x4, &(0x7f0000000640)="d04653983fc0bc55cca09f80101a654e63740bb768b5d0434486ea4f9f8e78a1c16b0dd29b1dcae806e35057247201a75f46138cf3542e66fd9fb271564ab59cc27091976d6ab153f708a9893c09c7fa128f0e5e36944c2a8f20475a1d716f7b97d7a55b628a9c84b7f6b56822e441b60a3f9ac4ff503b993c0ce8efcc6fce47b0e712f301cdcc4e0a90d8c011718476dab8b5e545f216b91e63d5b7a088cd4da0e08ad4c4b50bfbf404003d1248a9c577905ce0b7155d9326a3b4484eeabb011c3dcdc477b2", 0xc6, 0x2, 0x1, {0x0, r1}}, 0xff8) r3 = inotify_init1(0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x6e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000080)) 18:36:01 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:36:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0xfffffffd}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x60880, 0xcc) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000540)='./file0\x00', 0x80) pwrite64(r2, &(0x7f00000000c0), 0x17, 0x10001) openat$tun(0xffffffffffffff9c, &(0x7f00000190c0), 0x0, 0x0) eventfd2(0x9, 0x80001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x60, 0x2, 0x28000) 18:36:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000001c0)=0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'macvtap0\x00'}) fallocate(0xffffffffffffffff, 0x4, 0xa8, 0x7) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x8) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x80, 0xff, 0x20, 0x1, 0x0, 0x800, 0x18002, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x1ff, 0xfffffffffffffffc}, 0x42021, 0x3ff, 0x7, 0x1, 0x80000001, 0x1, 0x5, 0x0, 0x8001}, r1, 0x4, r2, 0xd) 18:36:01 executing program 7: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)={0x14, 0x52, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x14}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x4, 0x1, 0x101}, 0x14}}, 0x0) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000440)=""/205, 0xcd}], 0x1) getdents(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) write(0xffffffffffffffff, &(0x7f0000001200), 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8e, 0x3, &(0x7f0000001340)=[{&(0x7f0000001180)="013a3dc67cf47339573aa6a361b79a3006b9cbec7db132a129c7d2274790c1aac02285ccc733d7bfa6c5ae62d6c8fd8e0cfd39a0e49c98b354252c6a20210ebb08c584cbc7bbcb1b632aa7ec5ae950d4c47a270abacd45d469f367d3558dbbd3f2b2be29fbd9597718c7cc2f58bdeb571d82988216e1f0fc392337f7b97398a0f83ef17becff08d4714d38b4822cce372b9c", 0x92, 0x1000}, {&(0x7f0000001240)="f14b2beddfaf024842fdbe4fe8b29ab938e1ab1fb48ae277375924b54b757ffe34db71144b65877c294ed4f0784af5ca2c72ec58d77078da6736865f4d46b4065d6e7df6c05348906b80ebe6f2e0daee7a7f11c733d357c4a075f4594202a965b5807cafecf87a908fe758776db57bc449cc6ddb95490ae570a91b6f008ce51f6fa03a656d795e8292e3228cbdcd0cdaf4f016d4961e0fd79ba60549c2746d1b7e4321231bc404d9067cc6fe8a9919e6c589454b16df0e3afad19f219939c349fc64943bdf1641578745cf69b4db9791b4b9865de194309b8720c97324f8db9574d22820c902eebe12ce0005f238ba69a811f340", 0xf4, 0x80}, {&(0x7f0000001e00)="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", 0x1000, 0x2}], 0x4, &(0x7f0000000100)={[{@size={'size', 0x3d, [0x6b, 0x6b, 0x34]}}, {@mpol={'mpol', 0x3d, {'bind', '', @val={0x3a, [0x4, 0x37, 0x38]}}}}], [{@audit}]}) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000001600)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000015c0)={&(0x7f00000014c0)={0xdc, 0x1, 0x2, 0x3, 0x0, 0x0, {0xa, 0x0, 0xa}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_NAT={0x74, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @private1}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x4, @mcast2}}}]}]}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'sane-20000\x00'}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x2}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x7}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x2}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0xfffffffc}]}, 0xdc}}, 0x4000010) getdents64(r1, &(0x7f00000013c0)=""/149, 0x95) [ 440.889202] 9pnet: Insufficient options for proto=fd [ 440.912522] debugfs: Directory 'loop0' with parent 'block' already present! [ 441.053596] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 441.053738] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 441.055662] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/27/file0 supports timestamps until 2038 (0x7fffffff) [ 441.060387] ext4 filesystem being mounted at /syzkaller-testdir739428249/syzkaller.rUe0I0/7/file0 supports timestamps until 2038 (0x7fffffff) [ 441.166368] tmpfs: Bad value for 'size' [ 441.457995] tmpfs: Bad value for 'size' [ 456.028631] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 18:36:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:36:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33343135323238343000"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000d0a9da48497c4915a7449265c083aec0010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000003800000000000000", 0xfffffdc2, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010500)="ff010000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030000000", 0x40, 0x1800}, {&(0x7f0000010f00)="2000000038fad6a438fad6a400000000d1f4655f00"/32, 0x20, 0x1880}, {&(0x7f0000011000)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000500000000200000004000000520000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d1f4655f00"/160, 0xa0, 0x1c00}, {&(0x7f0000011100)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000600000000200000004000000620000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d1f4655f00"/160, 0xa0, 0x2000}, {&(0x7f0000011200)="c0410000002c0000d1f4655fd1f4655fd1f4655f00000000000002002000000000000800000000000af301000400000000000000000000000b00000040000000", 0x40, 0x3c00}, {&(0x7f0000011300)="20000000000000000000000000000000d1f4655f000000000000000000000000000002ea00"/64, 0x40, 0x3c80}, {&(0x7f0000011400)="ed4100003c000000d1f4655fd1f4655fd1f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000e50617fa0000000000000000000000000000000000000000000000002000000038fad6a438fad6a438fad6a4d1f4655f38fad6a40000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d1f4655fd1f4655fd1f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000700000000000000000000000000000000000000000000000000000000000000000000000000000000281944c0000000000000000000000000000000000000000000000002000000038fad6a438fad6a438fad6a4d1f4655f38fad6a40000000000000000", 0xffffffffffffff13, 0x4400}, {&(0x7f0000011600)="ffa1000026000000d1f4655fd1f4655fd1f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3334313532323834302f66696c65302f66696c6530000000000000000000000000000000000000000000007dfbeec50000000000000000000000000000000000000000000000002000000038fad6a438fad6a438fad6a4d1f4655f38fad6a40000000000000000", 0xa0, 0x4800}, {&(0x7f0000011700)="ed8100000a000000d1f4655fd1f4655fd1f4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cf6b9f150000000000000000000000000000000000000000000000002000000038fad6a438fad6a438fad6a4d1f4655f38fad6a40000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x4c00}, {&(0x7f0000011800)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d1f4655fd1f4655fd1f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000800000000000000000000000000000000000000000000000000000000000000000000000000000009b745a560000000000000000000000000000000000000000000000002000000038fad6a438fad6a438fad6a4d1f4655f38fad6a40000000000000000", 0xc0, 0x4fe0}, {&(0x7f0000011900)="ed81000064000000d1f4655fd1f4655fd1f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c2cc444b00000000000000000000000000000000000000000000000002000000038fad6a438fad6a438fad6a4d1f4655f38fad6a40000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x5400}, {&(0x7f0000011a00)="000000000000000000000000eaa7000000000000000000006c657273797a6b616c6c657273797a6b616c6c657273797a6b416c6c6b0a0000000000006c657273", 0x40, 0x57c0}, {&(0x7f0000011b00)="020000e12ffe2ef89b29f392000c0001022e000000020000000c00ff012e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696cea31ee6c65310800100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c00", 0x80, 0xc000}, {&(0x7f0000011c00)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x10001}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x10400}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x10800}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x10c00}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x11000}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0x11400}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0x11800}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0x11c00}, {&(0x7f0000012400)="00001903000400a30000000000002000"/32, 0x20, 0x12000}, {&(0x7f0000012500)="00000000000400"/32, 0x20, 0x12400}, {&(0x7f0000012600)="00000000000400"/32, 0x20, 0x12800}, {&(0x7f0000012700)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x14000}, {&(0x7f0000012800)="0200"/32, 0x20, 0x14400}, {&(0x7f0000012900)="0300"/32, 0x20, 0x14800}, {&(0x7f0000012a00)="0400"/32, 0x20, 0x14c00}, {&(0x7f0000012b00)="0500"/32, 0x20, 0x15000}, {&(0x7f0000012c00)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x15400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x18000}, {&(0x7f0000000040)="0200"/32, 0x20, 0x18400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x18800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x18c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x19000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x19400}, {&(0x7f0000013300)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x1c000}], 0x0, &(0x7f0000013800)) [ 464.476516] 9pnet: Insufficient options for proto=fd 18:36:25 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x5, 0x0) io_setup(0xffffff7f, &(0x7f0000000100)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x80, 0x7, 0x8, 0x1, 0x8, 0x0, 0x8, 0x8001, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x10000, 0xffffffff7fffffff}, 0x12003, 0x80, 0x400, 0x6, 0xff, 0x8, 0x7, 0x0, 0xffffff78, 0x0, 0x9}, r0, 0xb, 0xffffffffffffffff, 0x3) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) io_submit(r1, 0x7, &(0x7f0000000980)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x7ff, r0, &(0x7f0000000440)="bb36e605855e209ddd2792d34223c58b7b84aa15ad43f628e384c9fb9ca2142262be261ac89d525ffaecf6196c131d2782f1d23e88f535a8bcb2ea626d1fc4ab478454be8049b8b842742b8bf21c125749d54310219778751ee8ca401011bb7f4b91da36e1e13dbea9bc75fbe3b8ec62d79203f4dcb77ca757d729a8204f9bd7fc83d978fed45611f16dafb2048fd901bdee9fff01694e1ea8101af235c729f918362eb35acb2dd7135415a514209f0684bb583204bf1377b01628a737ac7fff9c74393465e4bfd65d25aa939d", 0xcd, 0x3, 0x0, 0x3, r0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000540)="a60292ff16c738d5d20f59b19ab8d6a40539fc26b5721a3eafa4822e532b5d6f9b1c4da14c46fe8a14e9fc04365752ed061a83eff9feb99d3971efbe49a23a21808916d5cf5d19fa622ded9184b485ffa5c1bda5be3a8b8d2f1a740e80111c042d4cb6930aa580f2179e44fe2af0086b9ea6c7f9f46d59cd754a6801c7df9eb13ae23817bbeca9e4f66238f8e3dff73b137de31898f69745022763bc619e534f83f747c32b6b96026a4ba649ae0a932864e7e392966ca8970663a5fc859edb82a40534", 0xc3, 0x25, 0x0, 0x1, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x6, 0x7f, r0, &(0x7f0000000640)="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", 0xfd, 0x7, 0x0, 0x1, r0}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x81, r0, &(0x7f00000003c0), 0x0, 0xae, 0x0, 0x1, r0}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x1, r3, &(0x7f0000002100)="a4dab319410e2afdbedaa64c48d443903c04cf25a9f360751ca8a904e1779cbe275f7f574289895bc6a6315b0603851d9ccf7aec3bdeb419144ed49f069f21a9bda212be2e3d8e12f947b1131556c4e3b6a0787bec5c9b332f658495558ad822238b851bda91c78e3efc26c739e0d46118c57ddee85ac34bdc5abed5654fd1c78c883bf4f5435a0eea1a1ccc6291530a6dc8361787c6fd367514d0d3208b96fef8afad14bf270ca476c22913fc2cfcfe58d0f1c68cb0e6212b7dd379a2abc8a2e01931ec1bcded6f0de058a54dd4eb4d2cbce8aed50f3eb396e1bfc84954b983e39bc351207aa8b836422193dae72f49e142054a9599f2f46e6b6d35946708a353f7a76eb1f3403cec06c31bb84a0f9f6d495b8f749d25ff02f806c3ed0d6aa100fd1b68120309e650e48a590aa26747587c116cfbe25f62c1372db5608108ec327c80fae1377dc64c965314aedd5958fa6ed5e44e201f742f8d594e85e36435ab7229e7a69ab387c1d0503157bf39efa4ab636c0bf5e980b8642c54a96d7802048066c7b481b8a4242efcd4638d7d4572b53a7ea364f4e624d239b82398f5eaad71d47694723f27394a4f87a5b7fe63d78625896e0baf93e52077e52475ba6d03a3ba4410c6bbf31bf42667999b295690dea79d6bb91f10c0756caf2600ce5e5ddbf8022610ffbc11d6ab58eab9908b0108c6911945f3c2acb63c4925c0a4f6b0144813aad751db42b6963b7c1f8a4ddfde58b50be9cc68188e05ea3d7b5051c120169c85f36b2fa93cdcc22bcde0fb66b68d8fcb34733d271cb59056f639461ee800b20ea7c85bef52632c2dcb92ef9cf00925f404d55790ad32be46aa93fe33ae8817f2781ddd4fd5d9a223c973a0397a98d2da070fcf306ad532a9f47e614e2303a5f59551b026e9c033572e8a14d27f6ca1a5699acdf3f9ce027485373ae7857469bb3276ed2ed5e64e0ee87bab8b25edc0d330a56f8cbde0a4127dd921ee5ca1001a369aee900ce8b1c5f8d6d3328082a29fd312974edac98cb76b63b5deccd39ce0c5c8092add41cf417a0a3b2793f27fc8244675d1e1a9cce480b8883bae1c86b925ea6984d5c9397621bffdc6a2dad5c491f97d58162f38e744c26a6711cb7382f858d949713452bf28c97c0daacfecacc3a7021169042517e450c4962a08ae0a74ecaa7f48b08f7886401a892333954b009c36c75c87f793356ee5e7445fbb193541c15d53c8ea08554901478e3efcb518771fd65599c7af8d6a739e55e3aad5e3ee5fb4bac3e0d4103bd6dd5f8fff8855f712e7549f20b4601bbd9152794ed8232fe663460e7ce0cddd32a9bc69c389daa6a67b88246b31731d261db40d945a86b76640ddef37644b6d7ecd51c8acf604b65253bc60911e3efadb5399483624577836c64bae2c1a34b0d56b194a7701d4acecdc639665673664b8acfb0a87f2074b80bf20694f83e2e38f0f60378b9169b9cf8afcbaeeae308ec3a181e6eb9c7f8415717f7ec9d4109a52490eae362da108194eb5215b538d87265805acf6fdab80b8d8bcc2efdea76f51cc5cbb22f3fd369860bb92d5501d7df02fd137dd6d9cdbdeec5e9803171d834ec43ff96aa4e59d5950623e066659a70a215e2bc3ef2047215cb217c4948f88d12a2be5aede4921157b6a4b1ad70e5759bfde119ea750b1e6644a80cceb4750b7ad9a776e52ad7bbf949505542673cb11e031d45c3ba7b8f57b552a4734a41357a1b687e89b6956e7d1150f982be3adbba1d0f7be4247b4dc3b13f0b8c0a952cd5ac03aee9fbe246b30944e22b2516f975bdf8206aa77c2dbc1c2b1a44de3e2f0dd9abbddb79777d83ea0c57bcc5d04d1ecb06152c12b5749dc72ad80e68403c144232486bfae17d3ef3b0c353437c6791e1dab8ffcf6ab32f7908463d55dc8aeb94a85741a4321519a8288a76f9630aa00e8e27547de67bb6d2af509f60f1b449209a7fb6e661a34f51c977f47d988ea608fb37c62fdbfe6cb85b5fd2e2fd6b4b5f04bd7879623598b61d72fa9e5531ffb32d9ef22cbf3a05e2bfac3a01728e07cf2735c9e43877843eb4214015a2d37fc0c5690a3936fd8135d800eaa7074139f1f2d8974b3c78f4b151cdad49f18b1ad85615ccc89c80ba294f5e4a867ba8b1b31d07f143a5a9c30da33a419db66e41fd40e1312cfa588b23e112ef08f831854c5a30ce1501d3d63e52ee2186a09ffa4ea2e16646efeb7b52dd729c739dbd123b55d5857777daa063c04ccbee160575a8c5948dd37e5dd1e9e682769e40d31936895ac63a9e287958df5ec9a3a1675a9c3d1777c65c4e17103d20c8a52263f0b387374de00adf1b72818a33a84d3bcc579f5437bf37b8cb373e66b90e22cd2f80ec6e11d6b170d9cece0088ab5552eba61e74883074ffc154d50b6d618371f7cb754cded5964545cf0014be01e0858b2b4d0e0f97a2274d7dbee5a3285a8f177f576fa7640edc03b5263e667517b9672cae21daabcd5234163d9b1695d7042dd923440a6ed9e4475edafccf200c079692dd077d0c520bee6b1a71feb6993137f974261c18d8f391eb79238a1bca1644a2821deb3994699928d2d62862bc1abb52cd3c97fba56cfccc5c5030c74f57da21b739f9f0b54b9bef6f4c47511aeba18957bf90702a315726cc01a78d97c6911166f3f242684a449463242cf7c2bf30f65a1890ef33d0281367e9e698e2412ef6c8a35a0354a896365a8fe283e4617dfe9ffb5f193c66bc7c0a81ba3565c4af0a49dc3d7c99d0e9e2150b66653640f793fd6018ca459e97f9ef4c04d06c337085f2c9cab5414d27e51f9f75afb629a6159af3e4714ae17916e5b3634ba6f08812b71d9f83527b845f04f91163d063087bea26ab3cd15608519928296bd7d6c75b782570b9a8dfc706fb14fe41be13d6cdd8a6eba573e64aa29c5a97a19a08f20d528e5f43165a2969ec53da816d0418377b296927b2892aeae6802029fdd6e3017889f5248c5f964c2a96e6ac60011af729a88d9f9a78594f29b0da0dbf6ce8e26a88dc9ac8b5553839ab1a9fcf2d02eb42250904263e88a77294aadd97cd0de3d7c05f80daaf330596046d8455f48c74dc4e1ac1de050c6683167e08895a0a33932ddecd670e5092fe71200b188efb38551016cba50339b940deaf17cc90ed34bb753665186caec51aa7e127345cf6f7cd30b9d5945ccfa96f5337c2db72714579d2b32c3a0628a77d9ec19608d6817480c8f441043c3a526f9da476c6cc0926e06257102ca2badd5d0689bceddf924ca856fb06feee9ed71ba916eec7393f13cbe84e8dccc16409983f72e220b188496d09e25e1f1a0f5f9852d8e24ac430c66955d52689e6af58860d15f73e2bb0165572f8cf18d3be7138f9c6f2b40693f7fe96b4efab88e363b11877733ee7566d088691a58e5a90de6bc3c6e4b613cf94f93d6e9d6dbf576b7dab0756f8432fcb107fbc04fdc77b8f65d6dbbcdc202633bed64ed00d79e47bb2ca6788e43ad351e3339e090ebe351ca4960eb7c1a990522c47527f15e9a7acdd6dc661c70d87474d4c647a45308016aef140c3786353bfab17341e8e3a931a2951e71c2459711130c8ebef92e682232937d4376ab7d0cb50be458e21ee1e4f6dc5f2eac7be500696f93cacaec49c9a2951e6f5f05e659516730c4c5416c3be668158cd087d5eda17b059997f45d849ccfb8b29d2b8c43f670c8d34d9a3791458b9b6b94553301aed0492b68c82484870bf78fdddf577283bc62c91aedfdab986374b75069ac47c9eea3c38d5f62b8fce48ba018c20e4a8eb57c9b7ffb7c48d22365523e8ce5b4abe6265112688aa4deb9dc4f53ddb549845159448648413a6165c834bbdf7174fec3c75e95866b90e2c9cd816e5dd2d4deabfde56be53e67ec7cf35ddd4c484e287354b78bd9e812a31784b5e2ec4e16f07accd3f298846262b1c8596c804d8300db5e912238aa11620a75a70763e8d143f1f9652fde38980a44932ecb665f035eb6779ea915ba75f2e0cddcf7ba4f30b7bcd6e45095d89a7420a892b52e75632c5c048a09913c03301ae54344f79b2d8acdaec939f97ed55e88e918400542d45086b4d81611405d8a20d207d755e7a107d3424cf59376fa54efa7c56dd60422f8f36cd2b703da6f6629d1602be45be9054ed7808fa39ffb3bf412aeab3047a51b2ddb5e8c20f175cd00b289fe81984b4908388ef07d5e1205b0194f310edf1ba0b3dd4ad2c13054cafed4f474251ef15d6911c11624bca6a269400070e4c4a25c48c656cb15f2252328ea3ebe1a4598e1fe5d2b938150a0ec538df33a15e8001dec3b1bb069507abfcf6c961c6ee3897065c95f69c080653e088204eab59907047cd18950123002e16a300f48656c82c7d3de68fd4390884cce47ea4cd02ec4047d037b385897438a892de018ea6a6f15a09eec6eb3c2df984f8ca788dc09ae39198ba7f7a21cb168dbcb60c4be12f7df34df97f7f8f53639ea4e7f83bd5551119b9d0d383e5d1890725f06cb5430558929b73214243fc1d87bb6a1e801d2fd650be76e74ed273bcbf4a7afd937733e16e30128f9c3b23601696c47df3182461c9234a1561401e51efc40f62f898163d7037df838cf6cc8b73eb6245d216ce8df012c9e2079dcb98b2e0a58c37e2e5358d9e34651475dc548887a28caa4cef17e07506f941d262e59c9a3e0d1f05e6d517730c164f1a4b2df870427758ee3e14c37c35ee5d451622e0b89f162bc8977b302623d6f8f791d7ed5c80d5c91b394f51c8b6a42e655339fd1842ad69be61e3fd151f513bcbbfaf452e39a60666e6b4b7332c02518c525e90ef6940b71ad4c9f337eba85303a27f6fc0a97c624c170ae57d388acb16ee81707c64639d3ee0c0de77feea310d9d2393904143540b75db28eb3c1c3502770dcbdbffb99832e5dca13d42168f3c285c4b50ce7b51c0cc3c5cbbc183939203c56d371449cc6d38a1a5ede2934cc0f56d5c5c2aecd33ab795644d534fc133fd2f2899fe109b90b7137b682bc42c07417ad9dddb5880b2449803438706643bd2bc6fa1279aa63ef18fab79541ecf2302bdf7319d4efb00bfe212fc1028294466fb0b47c784c947f404b5ef9da82a27bf4cc6e0cf9d5265fe6c079582e5262b49d4568148627a12a959352471eeb928642872dc4bf3fbf9b030a7aec015f64377aca60e8ff0944efded014d39c80a67d032d6c13e149a479b2c971bdcfcdb6321c91260b52fc32a689438dbfd0cb3c39bbb75ef113166897f28a1163b7473a53635b67191dfe9fb0ccfd507b2174862fc0bf686548d7a232687655baccc385a42b618f15d1a6c714ecf8a462b4102f6f5a27a552f501f218e426b76c166892e59fc834cb8d02fd8935a20d76ea583bd4174ea92a87e3dbb6707c1e25f6a969fb400c544db7edfc4a3a2d825d31341979be943241f1ab2daa0caa2e58ec56edd74e281f69495e7013e2019e28fad2ef5cfeae66d9d99ab97c5f4278fd19535e5b0623d6c7d0780479b8bfa4c0aa75b028fd26c091df2af693a99de4c2db3c11c0e00c2a0e95af9d2ded7b3b3b50f304161702ce875e8dec263b169472b970d209ac0fb65d759ed31c2cb42bae2c5f47d3b1f1593468e4afc79ca5cff701b72170d98c3b89c8aefc87d6c4db067674023548b63e017a836d0bfb403010a13a39ab18ceb6fc70ba85eed29cf51040fcfeac9a276b26dbf56737c243cb2c0e667f188761eeeb8cc8efff25cca5a60f2741641ed8cd4801ceb95a3bc456ce3a3a7fabb0d50ea4c30b1238", 0x1000, 0x80, 0x0, 0x3, r0}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x8, 0xfffa, r0, &(0x7f00000007c0)="b96543ad13eacd377d0ae96927d7d3240d12c14f874d48e293a52bb316c4353fdac87609a4008c4fdb9d4efaecf71427ed33dbeef7393a3c421a0e8d603325afcd6c3ca05326fffd45bb9c4e1d3c3ebde53973c7cb7e47d4f20d2d729a0f6ef55cecc7d51a1cb0339bfeb9dda60c59008f13e4191a05e05c090e455befeceee3943d63f80750fbc8874a009250", 0x8d, 0x4c7, 0x0, 0x0, r0}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x8, 0xea, r0, &(0x7f00000008c0)="c4def62e1a3dc133be230e9cf07b50029cf74ba03acfe5530101f45fe289362f5ded4a7aa5c085f2eb47a17f86588b3f7743c16a406b193b567c663d7bafd63e1d04128e97514f0aeae2c9e7e6b8b3689eabc7daaf7d74e5fb", 0x59, 0x1000, 0x0, 0x2}]) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) fcntl$getown(r2, 0x9) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt_cache\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r4, 0x80404532, &(0x7f0000000280)=""/209) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0xbb70, 0x7, 0x9, 0x7ff, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:36:25 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x1d) connect$unix(r1, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r2) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) fcntl$setstatus(r4, 0x4, 0x2c00) write(r2, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r5, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r5) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x48000, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r5, {0x0, 0xffffffffffffffff}}, './file0\x00'}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="02000000010005000000000002000100", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="040005000000000008000500", @ANYRES32=r8, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="080006004de627066cdd3a71f7d4cc76babff1ca910f14f56e8d202fbb82f8abd44cbbb7ebe29570ea9261fbc70f215495d721c315ddfa13cdba003f6678ef7b0859f00e3dac600cca0e0ae22e4290aa4e336802c5fcef682ab42afb8ae046fbdba04c4667a420d5c366ef64a4727830525826b191e94d2e79cfe66cd18fedb4ba2000000000000000bc0f6945642c99c4ba7248a84ac92a85dfc7b36a458a0d3682ab39ba134d45fd76caaf86e8053274", @ANYRES32=0xee01, @ANYBLOB="08000100", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=0xee01, @ANYBLOB="10000200000000002000050000000000"], 0x74, 0x1) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r6}, './file0\x00'}) dup3(r0, r3, 0x0) 18:36:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000001c0)=0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'macvtap0\x00'}) fallocate(0xffffffffffffffff, 0x4, 0xa8, 0x7) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x8) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x80, 0xff, 0x20, 0x1, 0x0, 0x800, 0x18002, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x1ff, 0xfffffffffffffffc}, 0x42021, 0x3ff, 0x7, 0x1, 0x80000001, 0x1, 0x5, 0x0, 0x8001}, r1, 0x4, r2, 0xd) 18:36:25 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:36:25 executing program 1: creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x200000000000, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x200000000000, 0x3fb) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file1\x00'}) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fcntl$setlease(r0, 0x400, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) write$binfmt_script(r5, &(0x7f0000000340)={'#! ', './file0', [{0x20, 'dfltgid'}, {}, {0x20, '9p\x00'}, {0x20, 'msize'}, {0x20, ':@{-!\xbf\\/'}, {0x20, '#},'}], 0xa, "3035248bb11d263b5b2badcc3a63269fb45e3c25cf1c326dbc60c2d94379358bdbe7afa4e9b9b75b8ee1aee0d753492e0255a7648ab9aa21c7aa0ecc45f3b64f4593b7afdb963f4258484e2eb0a344880d90f6ac8258ca04ddf412a9eb70116dbfe9de8ddf1789be0bfaa0512ebdcb093aa77f2274627710ee4b6e9e86aaec87186a9a0e6d875efeb69d808bcab67ec8282409ca004eb112b5d8fecc5fd851d286dadc6757ec9ecfadec3868cfad6e"}, 0xda) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000000940)={0x90fd, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7d, "efbaad1edb1309"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000000200)={{r6, 0x2, 0x8, 0x3, 0xffff, 0x49be6bc, 0x3ebfb814, 0x81, 0x7, 0x7, 0x0, 0x0, 0x1, 0x401, 0x2}, 0x48, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 18:36:25 executing program 6: stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@rand_addr=0x64010101, @in6=@local, 0x4e21, 0x2, 0x4e24, 0x9, 0xa, 0x80, 0x20, 0x2, 0x0, r0}, {0x4, 0x1, 0x1a0fa7b6, 0x0, 0x2, 0x9, 0x9, 0x6c80000000}, {0x6, 0x8, 0x6, 0x6}, 0x8b, 0x6e6bc0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4d3, 0x32}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x7, 0x1, 0x1f, 0x31}}, 0xe8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, r1, 0x0, &(0x7f0000000240)='./file0\x00', 0x80, 0x8300, 0x23456}, 0x101) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f00000001a0009000000000000000000ac1414bb000000000000000000000000ac1414aa00000000000000000000000000000000000000000a00b000000000003bdb601ab3bbddaea1a8f62b80cf29a2ccd242bd7ba074a67bd8693f8ef8e835e635b0c70339fd426e94cdb44db387c91f2f4f46616c019a6217f30099c19d87df22e57f26f95f35316864902fdd8d7ef39d171c77031d1b0fa3f00d", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="ac1414aa0000000000000000000000000000000000000000fc0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000553b41ad1d87a2d36f030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00"/178, @ANYRESDEC=r3], 0xf0}}, 0x0) write$binfmt_script(r2, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\x00'}, {}, {0x20, '}{!'}], 0xa, "49c52e67deb02e5c0530c1f405c87a17e60b42c91e87b2561f55fb45d3356b811bb38a84bd7e869066eee37726a84e0c96359862d769f903a209225181ed1aeaaf5b393223a8f4537a18119a9629c783d17d0b5d7463a26e27ef761d30319f7dbd70c5b4bd101311a75be4362ed647ae12d1983845a40af52905cbed502f49e27385e09f2189a145f89f84be72aed119f91c8f361b965e8577e23e4cc7a282ef58f2a1d914b2933d39a3dacfd7a65c73a20a106b22bf657efe5d8c3a8ec2cda734ab084c41b6b2f9a5bfdce3"}, 0xde) 18:36:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 464.627052] 9pnet: Insufficient options for proto=fd 18:36:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r0) read$hiddev(r0, &(0x7f0000000c40)=""/4096, 0x1000) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) read$rfkill(r1, &(0x7f0000000c00), 0x20000c08) read$rfkill(0xffffffffffffffff, &(0x7f0000000c00), 0x20000c08) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:36:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:36:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000001c0)=0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'macvtap0\x00'}) fallocate(0xffffffffffffffff, 0x4, 0xa8, 0x7) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x8) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x80, 0xff, 0x20, 0x1, 0x0, 0x800, 0x18002, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x1ff, 0xfffffffffffffffc}, 0x42021, 0x3ff, 0x7, 0x1, 0x80000001, 0x1, 0x5, 0x0, 0x8001}, r1, 0x4, r2, 0xd) 18:36:25 executing program 6: syz_emit_ethernet(0x2ed, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0) 18:36:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@loopback, @private=0xa010102}, 0xc) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5a, 0x2, @perf_config_ext={0x2000000000000000, 0x80}, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 18:36:25 executing program 1: creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x200000000000, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x200000000000, 0x3fb) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file1\x00'}) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fcntl$setlease(r0, 0x400, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) write$binfmt_script(r5, &(0x7f0000000340)={'#! ', './file0', [{0x20, 'dfltgid'}, {}, {0x20, '9p\x00'}, {0x20, 'msize'}, {0x20, ':@{-!\xbf\\/'}, {0x20, '#},'}], 0xa, "3035248bb11d263b5b2badcc3a63269fb45e3c25cf1c326dbc60c2d94379358bdbe7afa4e9b9b75b8ee1aee0d753492e0255a7648ab9aa21c7aa0ecc45f3b64f4593b7afdb963f4258484e2eb0a344880d90f6ac8258ca04ddf412a9eb70116dbfe9de8ddf1789be0bfaa0512ebdcb093aa77f2274627710ee4b6e9e86aaec87186a9a0e6d875efeb69d808bcab67ec8282409ca004eb112b5d8fecc5fd851d286dadc6757ec9ecfadec3868cfad6e"}, 0xda) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000000940)={0x90fd, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7d, "efbaad1edb1309"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000000200)={{r6, 0x2, 0x8, 0x3, 0xffff, 0x49be6bc, 0x3ebfb814, 0x81, 0x7, 0x7, 0x0, 0x0, 0x1, 0x401, 0x2}, 0x48, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 465.467462] debugfs: Directory 'loop0' with parent 'block' already present! 18:36:26 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 465.779836] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 465.781541] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/29/file0 supports timestamps until 2038 (0x7fffffff) [ 470.393229] Bluetooth: hci6: command 0x0406 tx timeout [ 480.322434] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 18:36:49 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0x9208, 0x0) signalfd(r0, &(0x7f0000000040)={[0x3]}, 0x8) 18:36:49 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:36:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000001c0)=0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'macvtap0\x00'}) fallocate(0xffffffffffffffff, 0x4, 0xa8, 0x7) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x8) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x80, 0x80, 0xff, 0x20, 0x1, 0x0, 0x800, 0x18002, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x1ff, 0xfffffffffffffffc}, 0x42021, 0x3ff, 0x7, 0x1, 0x80000001, 0x1, 0x5, 0x0, 0x8001}, r1, 0x4, r2, 0xd) 18:36:49 executing program 5: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x5, 0x0) io_setup(0xffffff7f, &(0x7f0000000100)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x80, 0x7, 0x8, 0x1, 0x8, 0x0, 0x8, 0x8001, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x10000, 0xffffffff7fffffff}, 0x12003, 0x80, 0x400, 0x6, 0xff, 0x8, 0x7, 0x0, 0xffffff78, 0x0, 0x9}, r0, 0xb, 0xffffffffffffffff, 0x3) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) io_submit(r1, 0x7, &(0x7f0000000980)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x7ff, r0, &(0x7f0000000440)="bb36e605855e209ddd2792d34223c58b7b84aa15ad43f628e384c9fb9ca2142262be261ac89d525ffaecf6196c131d2782f1d23e88f535a8bcb2ea626d1fc4ab478454be8049b8b842742b8bf21c125749d54310219778751ee8ca401011bb7f4b91da36e1e13dbea9bc75fbe3b8ec62d79203f4dcb77ca757d729a8204f9bd7fc83d978fed45611f16dafb2048fd901bdee9fff01694e1ea8101af235c729f918362eb35acb2dd7135415a514209f0684bb583204bf1377b01628a737ac7fff9c74393465e4bfd65d25aa939d", 0xcd, 0x3, 0x0, 0x3, r0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000000540)="a60292ff16c738d5d20f59b19ab8d6a40539fc26b5721a3eafa4822e532b5d6f9b1c4da14c46fe8a14e9fc04365752ed061a83eff9feb99d3971efbe49a23a21808916d5cf5d19fa622ded9184b485ffa5c1bda5be3a8b8d2f1a740e80111c042d4cb6930aa580f2179e44fe2af0086b9ea6c7f9f46d59cd754a6801c7df9eb13ae23817bbeca9e4f66238f8e3dff73b137de31898f69745022763bc619e534f83f747c32b6b96026a4ba649ae0a932864e7e392966ca8970663a5fc859edb82a40534", 0xc3, 0x25, 0x0, 0x1, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x6, 0x7f, r0, &(0x7f0000000640)="cbbb3f1697c0f2cf84a20659ca3f01a2e3ba1a1cd3e255485acaa86ac64d7f5cd860d4bf312b9d4b8cf22be45bc66801344348e83d7bf1b612c7503b34cbe97cbd782e2ad57aec9fbb08933486996b185907f69ef68b19c9dd6e99e469c26cae62994b4bcf5d8f2f1a5cd223d7bf2aa3f5f32ac84097e67cd805eab53b53d482cb6845bce725b19dafba769ad46e9ea151c975a16521deb6db707843c1be6843c8feeb4e8afefcbaa84c064eac61915788cf2faa09b6f9c5dca6e4d5cfe2159022983357f09b8b8ff45b82a1b3434d53662bb6ed96a4ac553771797a5960ed16488b822dc30d309d6b20e9241ee5a7bb378c3417816c3ecd9901fcbfba", 0xfd, 0x7, 0x0, 0x1, r0}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x81, r0, &(0x7f00000003c0), 0x0, 0xae, 0x0, 0x1, r0}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x1, r3, &(0x7f0000002100)="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", 0x1000, 0x80, 0x0, 0x3, r0}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x8, 0xfffa, r0, &(0x7f00000007c0)="b96543ad13eacd377d0ae96927d7d3240d12c14f874d48e293a52bb316c4353fdac87609a4008c4fdb9d4efaecf71427ed33dbeef7393a3c421a0e8d603325afcd6c3ca05326fffd45bb9c4e1d3c3ebde53973c7cb7e47d4f20d2d729a0f6ef55cecc7d51a1cb0339bfeb9dda60c59008f13e4191a05e05c090e455befeceee3943d63f80750fbc8874a009250", 0x8d, 0x4c7, 0x0, 0x0, r0}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x8, 0xea, r0, &(0x7f00000008c0)="c4def62e1a3dc133be230e9cf07b50029cf74ba03acfe5530101f45fe289362f5ded4a7aa5c085f2eb47a17f86588b3f7743c16a406b193b567c663d7bafd63e1d04128e97514f0aeae2c9e7e6b8b3689eabc7daaf7d74e5fb", 0x59, 0x1000, 0x0, 0x2}]) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) fcntl$getown(r2, 0x9) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt_cache\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xfff, 0x0) ioctl$EVIOCGBITSND(r4, 0x80404532, &(0x7f0000000280)=""/209) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0xbb70, 0x7, 0x9, 0x7ff, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:36:49 executing program 7: creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x200000000000, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x200000000000, 0x3fb) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file1\x00'}) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fcntl$setlease(r0, 0x400, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) write$binfmt_script(r5, &(0x7f0000000340)={'#! ', './file0', [{0x20, 'dfltgid'}, {}, {0x20, '9p\x00'}, {0x20, 'msize'}, {0x20, ':@{-!\xbf\\/'}, {0x20, '#},'}], 0xa, "3035248bb11d263b5b2badcc3a63269fb45e3c25cf1c326dbc60c2d94379358bdbe7afa4e9b9b75b8ee1aee0d753492e0255a7648ab9aa21c7aa0ecc45f3b64f4593b7afdb963f4258484e2eb0a344880d90f6ac8258ca04ddf412a9eb70116dbfe9de8ddf1789be0bfaa0512ebdcb093aa77f2274627710ee4b6e9e86aaec87186a9a0e6d875efeb69d808bcab67ec8282409ca004eb112b5d8fecc5fd851d286dadc6757ec9ecfadec3868cfad6e"}, 0xda) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000000940)={0x90fd, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7d, "efbaad1edb1309"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000000200)={{r6, 0x2, 0x8, 0x3, 0xffff, 0x49be6bc, 0x3ebfb814, 0x81, 0x7, 0x7, 0x0, 0x0, 0x1, 0x401, 0x2}, 0x48, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 18:36:49 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:36:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x28, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000008000000d2420100128300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e31343338373338393700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000441356bbe0d347458781d90fbb6137b4010040000c00000000000000d5f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000006100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d5f4655fd5f4655fd5f4655f00"/8224, 0x2020, 0x2000}, {&(0x7f0000012600)="ed41000000100000d5f4655fd6f4655fd6f4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x4100}, {&(0x7f0000012700)="200000003c66c62a3c66c62a00000000d5f4655f00"/32, 0x20, 0x4180}, {&(0x7f0000012800)="8081000000180000d5f4655fd5f4655fd5f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030000000", 0x40, 0x4200}, {&(0x7f0000012900)="20000000000000000000000000000000d5f4655f00"/32, 0x20, 0x4280}, {&(0x7f0000012a00)="8081000000180000d5f4655fd5f4655fd5f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040000000", 0x40, 0x4300}, {&(0x7f0000012b00)="20000000000000000000000000000000d5f4655f00"/32, 0x20, 0x4380}, {&(0x7f0000012c00)="c041000000400000d5f4655fd5f4655fd5f4655f00000000000002008000000000000800000000000af301000400000000000000000000000400000020000000", 0x40, 0x4a00}, {&(0x7f0000012d00)="20000000000000000000000000000000d5f4655f00"/32, 0x20, 0x4a80}, {&(0x7f0000012e00)="ed41000000100000d6f4655fd6f4655fd6f4655f00000000000002008000000000000800030000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000429f33c7000000000000000000000000000000000000000000000000200000003c66c62a3c66c62a3c66c62ad6f4655f3c66c62a0000000000000000", 0xa0, 0x4b00}, {&(0x7f0000012f00)="ed8100001a040000d6f4655fd6f4655fd6f4655f00000000000001008000000000000800010000000af301000400000000000000000000000100000060000000000000000000000000000000000000000000000000000000000000000000000000000000652a4c1d000000000000000000000000000000000000000000000000200000003c66c62a3c66c62a3c66c62ad6f4655f3c66c62a0000000000000000", 0xa0, 0x4c00}, {&(0x7f0000013000)="ffa1000026000000d6f4655fd6f4655fd6f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3134333837333839372f66696c65302f66696c653000000000000000000000000000000000000000000000d6db46a3000000000000000000000000000000000000000000000000200000003c66c62a3c66c62a3c66c62ad6f4655f3c66c62a0000000000000000", 0xa0, 0x4d00}, {&(0x7f0000013100)="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", 0x1a0, 0x4e00}, {&(0x7f0000013300)="ed81000064000000d6f4655fd6f4655fd6f4655f00000000000001008000000000000800010000000af301000400000000000000000000000100000090000000000000000000000000000000000000000000000000000000000000000000000000000000256c47f5000000000000000000000000000000000000000000000000200000003c66c62a3c66c62a3c66c62ad6f4655f3c66c62a0000000000000000", 0xa0, 0x5000}, {&(0x7f0000013400)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000013500)="0b0000000c0001022e00000002000000f40f02022e2e00"/32, 0x20, 0x20000}, {&(0x7f0000013600)="00000000001000"/32, 0x20, 0x21000}, {&(0x7f0000013700)="00000000001000"/32, 0x20, 0x22000}, {&(0x7f0000013800)="00000000001000"/32, 0x20, 0x23000}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x30000}, {&(0x7f0000013a00)="0200"/32, 0x20, 0x30400}, {&(0x7f0000013b00)="0300"/32, 0x20, 0x30800}, {&(0x7f0000013c00)="0400"/32, 0x20, 0x30c00}, {&(0x7f0000013d00)="0500"/32, 0x20, 0x31000}, {&(0x7f0000013e00)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000700"/96, 0x60, 0x31400}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x40000}, {&(0x7f0000014000)="0200"/32, 0x20, 0x40400}, {&(0x7f0000014100)="0300"/32, 0x20, 0x40800}, {&(0x7f0000014200)="0400"/32, 0x20, 0x40c00}, {&(0x7f0000014300)="0500"/32, 0x20, 0x41000}, {&(0x7f0000014400)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000700"/96, 0x60, 0x41400}, {&(0x7f0000014500)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d80f050766696c653100"/64, 0x40, 0x50000}, {&(0x7f0000014600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x60000}, {&(0x7f0000014b00)='syzkallers\x00'/32, 0x20, 0x70000}, {&(0x7f0000014c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x90000}], 0x0, &(0x7f0000014d00)) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000800)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) r3 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000d00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="480200001f0020002bbd7000ffdbdf2507000000b2afdf1241c02dc81726dd69f8a28da50f42924c3b1126bad459ab5f70282e5e4908001100", @ANYRES32=r0, @ANYBLOB="08002db3", @ANYRES32=r2, @ANYBLOB="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"], 0x248}, 0x1, 0x0, 0x0, 0x95}, 0x4000004) r4 = getuid() syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xffff, 0x5, &(0x7f0000000780)=[{&(0x7f0000000140)="798c94ba0e251d73431331fda02032afd51b61e30375b7135c56bb5863384adfb394d05b9d249d84d83fabcfccdc4a30af46ee8b3dcdb59f4ab022842c94cdd0aee6077d9c3291c921c38d78c1e1b65fbf055547f5308639c89f69f118a8b2f17b00", 0x62, 0x3}, {&(0x7f00000000c0)="a98771d9458909a5be90089ade1bd4c034ab500c743dd841857dfa2832746ea54d5f4074534d7c55b55aa8084152877c6c0c6f979e7acc842711388242160e", 0x3f, 0x2}, {&(0x7f00000005c0)="3bf2462ac91ce211712cddff2296e99e8c456efa3c55d98ee5fbeaa25b70d60a7f4922fd5d8a3c7e17a6056a9f6b07500764fe19aae044d21a3b6ea9494843d1d70e2c8fbedb00c29530fd8e4a306b58048e3e19ba503c4b33cd577b4b42d96aa66b7f1f52ed395fbf5896f85bcdad6995c9a7388a9bcaa6cf3708518c5b89ba3a93fda7b8d4399d3155dc8ea70be40feaf1aa6332daccf07d2c131971f4", 0x9e, 0x78}, {&(0x7f0000000680)="797a8b9c80efa6f4d1543c9116d9dc8d84e5f307c03d6218a1bbf9535e9b1cd06a452e291fda1032afd9b6c90168abba716aa893e74bd26920323a773158b878d4110d321b68f12219d60c721d4bfaebac0986ce111ff5ba539a01790028a733d95e690a53813ba6f75a5dcc71199e4b1bf7dc7a585a78f99d421acb964c43298f41d723cec20a1a226d51adde4a3201265b97fc5678ec1bfd2dfd81a8c5d1e5cb46a24367d73bfe73ab03bc8dedadf96c254f09deeb3bc7c47a0a00f60febefb26a40b06e76eb5c5ec36e14f0a6731e170ac0071c9318456df7b3c4998fa53f81", 0xe1, 0x7fff}, {&(0x7f00000001c0)="3070f237d91988003b2b388b454448bff2fa377368cd06cd9d8039bac4864cabaef4ffd661da54bd8dbc9a21", 0x2c, 0xfffffffffffffffa}], 0x18d5029, &(0x7f0000000940)={[{',.'}, {'($'}, {'ext4\x00'}, {}, {')^!$\'%('}, {'^!'}, {'%^'}, {'}.$[*'}, {}, {'ext4\x00'}], [{@hash}, {@hash}, {@uid_lt={'uid<', r2}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@euid_eq={'euid', 0x3d, r4}}, {@smackfsdef={'smackfsdef', 0x3d, '}\'}^$'}}]}) 18:36:49 executing program 1: r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff}, r0, 0x3, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ioctl$TCGETA(r1, 0x5457, &(0x7f0000000000)) fchdir(r1) 18:36:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xfffff, 0x8000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_open_dev$rtc(&(0x7f0000000140), 0x941, 0x20002) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000240)="e49e387004985a25f918701996e067a6ad321cde89bbb6bde431579f2df044258e2e91f0f6ad2091b4a8d0e1effaec81ba57b6c5a3bd7b67e2306194538dcc66d5d088835928e7af77181c497d47791446246419634089f35b666f94e3132e95695c9a563d7fbd69b7518b59c51cd40b30027d3f35aeb8fb08b97dbf0eb1337cb859056b7431cecfe5734fad6b49de6ecd038c7341dfe7e1947b8419f9fc10c58717", 0xa2}], 0x1) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x3f, 0x97f}) 18:36:49 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 488.809136] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:36:49 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file1/file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x10000080) r2 = syz_mount_image$msdos(&(0x7f00000003c0), &(0x7f0000000c00)='./file1/file0\x00', 0x7, 0x5, &(0x7f0000001040)=[{&(0x7f0000000c40)="830b3625e8af8081533b33522f96fcfb9a21a83bbb362832c40fbedc6bf61b0ecbd22116762f3be007e14eba6d1e440ceb01258d1b8c12cf54070409688d71294fe69a06cf1ed731d425967655a52619458dfd5caa94f9b3ffa34130089895750cf9d1ee45efb3aa5c0feda5f5e99969168fa261e09e5edc666228a7ce0ab1a9de4c028753fa6e7c16c95c076a42f9d12dbf16128574ed6174be59376f5e37b42a27d0badc5ec65854a8b34fd869", 0xae}, {&(0x7f0000000d00)="6a52e20d1cc4aab22ee4965259227f3212b8c4652ddd740400e7faba6b7db6f1e6ac6b55ca7d34550db0ebfb81fe9a796fe45f27c336dd64f9f00992516331607534c2964c55d5adaaef22e0b521f70c106b", 0x52, 0xfff}, {&(0x7f0000000d80)="df814de4526dfc0acce7df7f4d567c45bb4255f993b7eff1dbc47db98a7d551a4edce3aa7de0a64889f3d1974c9b894c10cc3124bb14283bc3e6503c6d04befe98c5a652ccd40ea45cd50e9bad34e3cc8025813ca3d8c1e268f5ef2a8d258943fdddeb50c68b17a9f87f68a3f0a08b968ea6564a2c0e8c54137a2b93dc1509535660e7025733f15373f786bd81ee63c5dab8710ff9f1c53a8ff16ecc7f737d5ce91ec9791c8b5bc51e64165dc77ec1afce759a3f247cbfded39c0b507c29a1390fba72b2efc7e71cf5434deddb82b298c1b89aa161de0f1130ab4dac25c009e0473a71b933b112", 0xe7, 0x70000000}, {&(0x7f0000000e80)="932cc642998b27face80ca39516a8d0bbaad4381064a9b0d64c4bcc4f0d981b7d05293f3a42848eac2d910902507c569327521168d6e2383b493450ec916e7e63f0ce924241ec361522ecf2bbe009bb364f99cf7b46f4099ef54c64b78e7b2410acfeb8f024c5662df8f283d31a92f7eed28603d72cc0a86f226d25a21a93455161ef46180026c1e8b463ad5c134ad7697b33472d73edee05c188494204d3f593af166b7202f64c5790a6ddc62a707a853d7151ba4f2a4c5ded021776515e98a56bb0d0f68d036b7d40b0a0c4661e7d83f71d67bdd83592540fc", 0xda, 0x4}, {&(0x7f0000000f80)="1241c6ac5d43fee5524ab72fd553e058d7ca1f154e4084cf8ae3bc0b5c74330717f54e17f90a67af0edf07752fe0a53a3c9818acec6d3516932b7d673501df64dc2c7694be0e013b4138c1c5d8d33b224d0884da51939db5400d659dd6f2c1ea31109b8672cd4b46eb70aa08ba1f7937a33e499a59e059aea7047cd5ae237b6885f1a8071f", 0x85, 0x8000}], 0x40000, &(0x7f0000000300)={[{@dots}, {}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@dont_measure}, {@dont_measure}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_appraise}, {@measure}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'vfat\x00'}}]}) unlinkat(r2, &(0x7f0000001180)='./file0/file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r4 = open_tree(r1, &(0x7f00000001c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file1\x00'}) inotify_add_watch(r3, &(0x7f0000000180)='./file1\x00', 0x20000000) ftruncate(r1, 0xffffff) sendfile(r0, r1, 0x0, 0x80000001) 18:36:49 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:36:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = pidfd_open(0xffffffffffffffff, 0x0) fchmod(r2, 0x21) fallocate(r1, 0x0, 0x6, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r3, 0x0, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r3, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x280048c0}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x1b1000, 0x0) ftruncate(r0, 0x1000003) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) socket$netlink(0x10, 0x3, 0x9) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 18:36:49 executing program 6: ioctl$BTRFS_IOC_DEFRAG_RANGE(0xffffffffffffffff, 0x40309410, &(0x7f0000000000)={0x8000, 0x6, 0x2, 0x7, 0x0, [0x6, 0x4, 0x3e2, 0x8]}) prctl$PR_SET_MM_MAP(0x23, 0xe, 0xfffffffffffffffe, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000180)=""/192, 0xc0}, {&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f0000000100)=""/43, 0x2b}], 0x3, 0x1000, 0x100) fcntl$dupfd(r0, 0x0, r1) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') 18:36:49 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) close_range(r1, r0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x200) [ 489.612615] debugfs: Directory 'loop0' with parent 'block' already present! [ 489.695527] audit: type=1326 audit(1669574210.305:23): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5693 comm="syz-executor.6" exe="/syz-executor.6" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f7927b79b19 code=0x0 18:36:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3f00ef00", @ANYRES16=r1, @ANYBLOB="050000000000000000006b00000008000300", @ANYRES32=0x0], 0x28}}, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x40047211, &(0x7f0000000000)=0x8) bind$802154_raw(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r1, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x40c0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x1) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) sendmsg$NL80211_CMD_JOIN_IBSS(r4, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r5, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x0, 0x3a}}}}, [@NL80211_ATTR_CONTROL_PORT={0x4}, @NL80211_ATTR_BSS_BASIC_RATES={0x12, 0x24, [{0x3, 0x1}, {0x18, 0x1}, {0x9, 0x1}, {0x36, 0x1}, {0xb, 0x1}, {0x24, 0x1}, {0x36}, {0x2, 0x1}, {0xc, 0x1}, {0x48}, {0x4}, {0x30, 0x1}, {0x48, 0x1}, {0x48, 0x1}]}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}], @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x40, 0x2, 0x2, 0x0, {0xc14, 0x192, 0x0, 0x20, 0x0, 0x1, 0x0, 0x2, 0x1}, 0x6, 0x8, 0x80}}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_open_dev$mouse(&(0x7f0000000040), 0x200, 0xc041) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002cbd7000ffdbdf2505000008000200040000000800020004000000"], 0x24}, 0x1, 0x0, 0x0, 0x44}, 0x4044) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$nl_generic(0x10, 0x3, 0x10) 18:36:50 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup3(r0, r0, 0x0) getsockname$unix(r1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0xc94dc0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000340)={0x4, 0xfe1, 0x800, 0xfffffffd, 0x0, "4d5c0e3d830cc80e4d49624d9fac32f023f646", 0xa119, 0x2}) mknodat$null(r2, &(0x7f0000000280)='./file0\x00', 0x400, 0x103) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000826bd7000fbdbdf250100000005000500020000000800030007000000050006000100000005000500020000000500060040000000050006000400000014000100fe880000000000000000000000000001080003000124063fbbcd915b7e99294dd92347aaef000000050006001f000000a92923d5728d7bc0e34f10f372a29dc030d92d962138aa1f1d5e31a4555a04c6faa1df46c9bb1b8afd7f2ecd671176d837e2e78c0c1bffc73e"], 0x68}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$unix(r0, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) r4 = creat(&(0x7f0000000380)='./file0\x00', 0xa0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x1c, r6, 0x5, 0x0, 0x0, {{0x1a}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_NOTIFY_RADAR(r4, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="200029bd7000fcdbdf2586000000080003004ccd284ce252baa556a39cbf9a788c2544d088bfec1472b0cfaa9c1fabd7d6161d519233", @ANYRES32=0x0, @ANYBLOB="0c009900020000003d00000008002201d601000008009f0004000000050018013200000005001901070000000800a100f5af00000800a000040000000800a10000000000080026006c090000"], 0x68}, 0x1, 0x0, 0x0, 0x11}, 0x40000) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001a00210c000000000000000004000200080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd6301590f164e897ec483443c5031250a51015282acc3df30f0c7011b46f0b231b1bc2cba469d7e73768584def341e4dd"], 0x1c}}, 0x0) 18:36:50 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:36:50 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:36:50 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:36:50 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:36:50 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:36:50 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:36:50 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 490.184816] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 490.193054] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/31/file0 supports timestamps until 2038 (0x7fffffff) 18:36:50 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:36:51 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 490.522825] audit: type=1326 audit(1669574211.122:24): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5693 comm="syz-executor.6" exe="/syz-executor.6" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f7927b79b19 code=0x0 18:36:51 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 503.896652] kmemleak: 90 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 18:37:13 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:37:13 executing program 7: r0 = syz_open_dev$vcsu(&(0x7f00000001c0), 0xfffffffffffffff7, 0x102) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/219, 0xdb}], 0x1, 0x8, 0x4) mq_timedreceive(r0, &(0x7f0000000040)=""/168, 0xa8, 0xd, &(0x7f0000000100)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000000)={@private0, @local, @private2={0xfc, 0x2, '\x00', 0x2}, 0x0, 0x0, 0x0, 0x100, 0x6, 0x4100087}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r3) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0xb, &(0x7f0000000000)=0xba, 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r4, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01020000000000000000180000000c0001800800030000000000280002802100050091bd52ac34d1927c990481ad6b6add86c21b5eadc3c6888c73a5037592000000"], 0x48}}, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r6, @ANYBLOB="01002abd7000fddbdf2501000000c80002800c00018008000100050000002400018008000100000000000800010006000000080001000200000008000100080000005400018008000100060000000800010003000000080001000700000008000100040000000800010006000000080001000000000008000100050000000800010007000000080001000700000008000100040000001c000180080001000800000008000100010000000800010000000000240001800800010004000000080001000200000008000100060000000800010006000000eead162465e305a545bd0bd7"], 0xdc}, 0x1, 0x0, 0x0, 0x10}, 0x8010) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000180)={@private2={0xfc, 0x2, '\x00', 0x1}}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8922, &(0x7f0000000000)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 18:37:13 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:37:13 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c00, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000200)={0x0, {}, 0x0, {}, 0x1000, 0x0, 0xffffeffe, 0x10, "0a4209ed20650ae1c796f31c17deadbb73d644cb4ecceaa1769a7ef4b065ee7629b99b02d746e4609506c5261f2bcb4f0a644d5d0b59bb44e4d9fab05e875584", "c0489de2ff5941721c3ad1993440e98564cb4f06ba9446d0f4b759489854545d"}) 18:37:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3f00ef00", @ANYRES16=r1, @ANYBLOB="050000000000000000006b00000008000300", @ANYRES32=0x0], 0x28}}, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x40047211, &(0x7f0000000000)=0x8) bind$802154_raw(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r1, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000800}, 0x40c0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x1) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) sendmsg$NL80211_CMD_JOIN_IBSS(r4, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r5, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x0, 0x3a}}}}, [@NL80211_ATTR_CONTROL_PORT={0x4}, @NL80211_ATTR_BSS_BASIC_RATES={0x12, 0x24, [{0x3, 0x1}, {0x18, 0x1}, {0x9, 0x1}, {0x36, 0x1}, {0xb, 0x1}, {0x24, 0x1}, {0x36}, {0x2, 0x1}, {0xc, 0x1}, {0x48}, {0x4}, {0x30, 0x1}, {0x48, 0x1}, {0x48, 0x1}]}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x14c8}], @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x40, 0x2, 0x2, 0x0, {0xc14, 0x192, 0x0, 0x20, 0x0, 0x1, 0x0, 0x2, 0x1}, 0x6, 0x8, 0x80}}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_open_dev$mouse(&(0x7f0000000040), 0x200, 0xc041) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00002cbd7000ffdbdf2505000008000200040000000800020004000000"], 0x24}, 0x1, 0x0, 0x0, 0x44}, 0x4044) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$nl_generic(0x10, 0x3, 0x10) 18:37:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="7f454c46050000f3000000000000000002000000000000006e00000000000000400000000000000000000000000000000000000000003800010000000800000000000000f9ffffff06000000000000000000000000000000000000000000000006000000000000003f000000000000000000000000000000bf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046b750b791cb9532b8b61cececd70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002dd927ffa589500"/1159], 0x479) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r2) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x7, 0x0, 0xe9, 0x0, 0x2, 0x20020, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5b3e, 0x4, @perf_config_ext={0x5, 0x20}, 0x5404, 0x5, 0x6, 0x0, 0x2, 0x661, 0xf780, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf, r1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x10, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000240)=""/4, 0x4}], 0x2) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000001c0)={0x4}) 18:37:13 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:37:13 executing program 2: listen(0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0xd0, r0, 0x800, 0x70bd26, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_QOS_MAP={0x2e, 0xc7, {[{0x8, 0x2}, {0x3, 0x7}, {0x6}, {0x1, 0x5}, {0x9d, 0x1}, {0x40, 0x1}, {0xfc, 0x1}, {0x3f}, {0xc8, 0x1}, {0x6, 0x6}, {0x8, 0x7}, {0x20, 0x7}, {0x3f, 0x3}, {0x20, 0x1}, {0x7f, 0x3}, {0x3, 0x3}, {0x81, 0x6}], "0329fca3bf28685d"}}, @NL80211_ATTR_QOS_MAP={0x24, 0xc7, {[{0x2}, {0x8b, 0x6}, {0x1f, 0x2}, {0x0, 0x4}, {0x3f, 0x4}, {0x0, 0x4}, {0x5, 0x7}, {0x0, 0x2}, {0x81, 0x4}, {0x3, 0x2}, {0x8, 0x4}, {0x40, 0x6}], "4f608590c0aea38a"}}, @NL80211_ATTR_QOS_MAP={0x24, 0xc7, {[{0x3d}, {0x4, 0x6}, {0x1, 0x3}, {0x3, 0x5}, {0x2, 0x3}, {0x0, 0x6}, {0x3, 0x6}, {0xf2, 0x2}, {0x1f, 0x4}, {0x0, 0x1}, {0x0, 0x3}, {0x1, 0x1}], "8e74807466effd1b"}}, @NL80211_ATTR_QOS_MAP={0x16, 0xc7, {[{0x4, 0x3}, {0x80, 0x3}, {0x6, 0x6}, {0x8}, {0x40, 0x6}], "7f1fb4a61d078d7a"}}, @NL80211_ATTR_QOS_MAP={0x2c, 0xc7, {[{0x0, 0x5}, {0x6, 0x4}, {0x8, 0x3}, {0x3f, 0x2}, {0x0, 0x2}, {0x7}, {0x1, 0x7}, {0x3f, 0x2}, {0x1}, {0x15, 0x5}, {0x2, 0x2}, {0xc5, 0x2}, {}, {0x7, 0x4}, {0x0, 0x2}, {0x7, 0x2}], "6c378450e979b222"}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40}, 0x40) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001140)=0xa2, 0x4) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x1c, r1, 0x5, 0x0, 0x0, {{0x1a}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r1, 0x600, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x81, 0x2c}}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000848}, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000001100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00']) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000011c0)='net/ip_tables_targets\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/partitions\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 18:37:13 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:37:13 executing program 0: openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) 18:37:13 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$rfkill(r0, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}, 0x8) 18:37:13 executing program 0: openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) 18:37:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="7f454c46050000f3000000000000000002000000000000006e00000000000000400000000000000000000000000000000000000000003800010000000800000000000000f9ffffff06000000000000000000000000000000000000000000000006000000000000003f000000000000000000000000000000bf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046b750b791cb9532b8b61cececd70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002dd927ffa589500"/1159], 0x479) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r2) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x7, 0x0, 0xe9, 0x0, 0x2, 0x20020, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5b3e, 0x4, @perf_config_ext={0x5, 0x20}, 0x5404, 0x5, 0x6, 0x0, 0x2, 0x661, 0xf780, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xf, r1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x10, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000240)=""/4, 0x4}], 0x2) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r3) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000001c0)={0x4}) 18:37:13 executing program 0: openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, 0x0) [ 513.174789] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 513.176876] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/32/file0 supports timestamps until 2038 (0x7fffffff) [ 513.178002] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 513.202281] ext4 filesystem being mounted at /syzkaller-testdir037038886/syzkaller.DKOSF4/35/file0 supports timestamps until 2038 (0x7fffffff) 18:37:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x2000)=nil, 0x2000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) pipe2(&(0x7f0000001080)={0x0, 0x0}, 0x0) statx(r1, &(0x7f0000000000)='./file1\x00', 0x800, 0x7ff, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000011c0)='./file1\x00', &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000001280)={{0x1, 0x1, 0x18, r1, {r2, r3}}, './file1\x00'}) vmsplice(r1, &(0x7f00000012c0)=[{&(0x7f0000000040)="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", 0xfffffe90}], 0x1, 0x0) 18:37:13 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:37:13 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) [ 527.555307] kmemleak: 47 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 18:37:36 executing program 0: openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 18:37:36 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x9c000) sendmsg$SEG6_CMD_SETHMAC(r0, 0x0, 0x20000001) r1 = openat$cgroup_pressure(r0, 0x0, 0x2, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r1, 0x80049367, &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x48020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x8, 0xffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f0000000100)="4dfe6e25fb2cb541363549d36c304ba8ff81a0c20c390e9348145a4f47daba1715ad739dd0e949dce348b1ba27331101147a1097e5ef34b35156e80d45fd068b65197cff950e099b5bad48d9de078ff96a0e8f23c2b3d0fafd66974eee3784da8b867054a6f19fcc9228597b95bc07fa91603e7f52adc6d99abeb13a6bddc2d39bbcadde617946c2ee3de909bade86793bafdf413db6fa78c4c94939cf036c144563f27bfb06cabe61d0f75ecfb987b5d9ef87422459d08778938375fef1bf4cb5b7e8", 0xc3}], 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) [ 536.212455] 9pnet: Insufficient options for proto=fd 18:37:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x1c, r1, 0x301, 0x0, 0x0, {{0x11}, {@val={0x8}, @void}}}, 0x1c}}, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001280)={&(0x7f0000000300)=ANY=[@ANYBLOB="1400002d0b394cbe6cbeab1600", @ANYRES16=r1, @ANYBLOB], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x24000004) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x181041, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e) close_range(r6, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001300)={&(0x7f0000000180)={0x34, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x47}, @void, @void}}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4008040) fallocate(r5, 0x0, 0x0, 0x8000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280), &(0x7f00000002c0)={'U+', 0x80000000}, 0x16, 0x2) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4, 0x2}) 18:37:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4206) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x4, 0x7, 0x3, 0x2, 0x6, 0x7, 0x3cb, 0x40, 0x34f, 0x6, 0x5, 0x38, 0x2, 0x97, 0x7fff, 0x3f}, [{0x1, 0x81, 0x5, 0x1, 0x4, 0x4, 0x9, 0x3a7e}, {0x1, 0x7ff, 0x3, 0x8000, 0x838, 0x6, 0x0, 0x20}], "fd473946137cb855ae591cc5d726343c0ddc7a5af18ce447a5db166a1dcab48263", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9d1) openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x40401, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x582, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 18:37:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'syztnl2\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x8, 0x8, 0xfffffffa, 0x80, {{0x31, 0x4, 0x1, 0x5, 0xc4, 0x68, 0x0, 0x5, 0x4, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x24, 0xd9, 0x0, 0x3, [0x80000001, 0x5, 0x3ff, 0x18f0, 0xbd59, 0x1, 0x0, 0x7f]}, @lsrr={0x83, 0x7, 0x14, [@empty]}, @cipso={0x86, 0x5f, 0x3, [{0x2, 0x12, "a2f8bd091ad033b590fbb8b90308e12a"}, {0x7, 0x3, "ac"}, {0x2, 0xe, "b52a2410befcc497bc1e90db"}, {0x2, 0xd, "5e94b6b76d5ff5d52128ce"}, {0x2, 0xb, "989fef3afbea0edb08"}, {0x2, 0xe, "e11706b1acfb382c20a0f2b7"}, {0x0, 0x10, "bed46be37ad294e2a36b91b27814"}]}, @timestamp_prespec={0x44, 0x1c, 0x34, 0x3, 0x7, [{@private=0xa010102, 0x1f}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x101}, {@remote, 0x4d8}]}, @rr={0x7, 0x7, 0x73, [@multicast1]}]}}}}}) syz_io_uring_setup(0x72a6, &(0x7f00000001c0)={0x0, 0x5157, 0x20, 0x2, 0x16d}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0xca7d, 0x0, 0x0, 0x3, 0x1}, 0x7) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff], 0x1}, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r3, r5, &(0x7f0000000440)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r0, 0x80, &(0x7f00000003c0)=@l2tp6={0xa, 0x0, 0x7, @mcast1, 0x9}, 0x0, 0x0, 0x1}, 0x1) 18:37:36 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$rfkill(r0, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}, 0x8) 18:37:36 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xffffffff8100000f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}]) io_setup(0x5, &(0x7f0000000080)=0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000a40)=0x1, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') connect$inet6(r4, &(0x7f0000000000)={0xa, 0x2, 0xbeffffff, @empty, 0x5}, 0x36) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x4, 0x0, 0x2}]) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x6101}, {0xffffffffffffffff, 0x1000}, {r0, 0x1049}, {0xffffffffffffffff, 0x80c2}, {r1, 0x414c}, {r3, 0x4}], 0x6, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={[0xd3]}, 0x8) r5 = fork() ptrace(0x10, r5) r6 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp(r6, r6, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) waitid(0x0, r6, &(0x7f0000000280), 0x2, &(0x7f0000000300)) syz_open_procfs(r5, &(0x7f0000000000)='net/icmp\x00') ptrace(0x4208, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 18:37:36 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:37:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES16], 0x1e8}, 0x1, 0x0, 0x0, 0x20000091}, 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000002c0)) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f00000017c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000001a40), &(0x7f0000000400)='./file0\x00', 0x8, 0x1) r3 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000001a00)=0x10, 0x0) pwritev2(r3, &(0x7f00000000c0)=[{&(0x7f0000000480)="145c0b1956e582f2c2ee88f6e2fa1aa5698f120c91d9a1d0f1c00005ad6151f3de2ff93c376af9a26c81d4d22a8fa722d2dfc6d4bfa6eb5f42cd4dfdd45ebf6159a8aed4e3d61f61d33b212485268b342d079996e2062b3be6f28a1183d2d4f414e50b0e08a1a1b6bda900f52e3759ec4a97ba73861b6c54cb0f02b4d72570ad85650a4f69b41f143f0c068a16762da41fe74a2fcf87c0df8e16d3e5907ab45471d6e9579869490c89007da3b3b4988c", 0xb0}, {&(0x7f0000000180)="aa145628a78bc6e786e0357432f2e0b0dd510f364deca2bff8d2432cb646b4baba7176b5e9af4182bba345a3743a45ed6da4e37904f5e69008bdb33d0e3b28b2387d90dc614dfda567d90acf5970bc05934e0240d79ecb7fe94dd4b5d6db9d88ba9e6fa4857105ddce26e02c90fbb07fed9f499d22d46b48504507", 0x7b}, {&(0x7f0000001e00)="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", 0x1019}, {&(0x7f0000001540)="8c9307bde8f0b3e09532dbc1773ba5949b5bd29119a1d6cdf139d06bfee9c71b39aa47bd661ca3588400043eeb5d7f2668ad56f649510334149f0a596da99c220bcf08c5d8099b795046598610cc5c613dc8e2f65dfc47bef86708b035fcefbd0553e1487719338f636a25e825f279d2e7efa3cd8c85e5b94e74a560f9fa3ded9d7365fa3b684f539d57e5843bf3fb358adc7e84a26f2faf415c38dc2f12c773330a360b2c2ad688ebd8b7230b0b22ddf4ef6b9fdc33f64682ea7545e6e5b3ecc7eb7bb707", 0xc5}], 0x4, 0x1000, 0x0, 0x8) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x582, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_IOC_CATATONIC(r4, 0x9362, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0xc0182101, &(0x7f0000000440)={r5}) 18:37:50 executing program 0: openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 18:37:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000180)=0x2) write$P9_RREAD(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x19) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(r3, 0x0, 0x37) pwrite64(r3, &(0x7f0000000240), 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x8000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r5, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x80, 0x4, 0x4}, 0x5}}, 0x18) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x7fff) 18:37:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r0) read$rfkill(r0, &(0x7f0000000000), 0x8) syz_emit_ethernet(0x42, &(0x7f0000000080)={@link_local, @local, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x1c}, @local, {[@rr={0x7, 0x3, 0x5a}]}}, @redirect={0x8, 0x0, 0x0, @empty, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}}}}}}, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000100)={@val={0x0, 0x88ca}, @val={0x1, 0x3, 0x5, 0x84, 0x4, 0xff}, @ipv6=@icmpv6={0x3, 0x6, "905ae6", 0x339, 0x3a, 0xff, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, {[@srh={0x0, 0x10, 0x4, 0x8, 0x2, 0xf701b42ab6d3584d, 0x8001, [@dev={0xfe, 0x80, '\x00', 0x1b}, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x1d}, @empty]}, @routing={0x322f68fc49aeffc7, 0x6, 0x2, 0x4, 0x0, [@ipv4={'\x00', '\xff\xff', @broadcast}, @remote, @mcast1]}, @fragment={0x3b, 0x0, 0x6d, 0x0, 0x0, 0x1c, 0x66}], @ndisc_ra={0x86, 0x0, 0x0, 0xff, 0x48, 0x0, 0x96, 0x3ff, [{0x5, 0xc, "d9fd28dd12e484656d1ca1c68058ced5435c1afdde01efaec1696af8e456f1ad2a0a06024849e09b3e15caad68e6f47c97829caad9108061aedbc0623b1199931428c34da07ad0dcf1ad6454d8208e8248065a80026df68fba2c67f756f417"}, {0x1, 0x1b, "6cc9b19d2a0d8b6808c5beec43da99d026bfb9dcb88f3130828c7220628093f49da74c5f2b70498fcd067cb769ec57afa3e9d106852cbfde91372e97d4971af2b58193caa8dd5e4f11736ed935a7e70cac536846f73982b9a2e071d2b90d2e0d217401de8e05a797d27891a903becbbd88069e997256852575d8c0cae40f00f8fd91f77f2f9c3bb0270ef1c832b02a0307479bdd502a1877daa5b09bdbc9a11a77ddce8266286bb0afa8399f9bfd22c6269da51f67dcc6fdc37b8a197f896326e5591c42593f5cc6c31b70b94b3eaf0c6a4bbeccff6c"}, {0x1, 0x1f, "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"}, {0x2, 0x5, "e7667651d2f3a2c764a90164783dd9bb6ff175054914b6d32f922d7fc493383547a6f4aa0a18cf3a31"}]}}}}, 0x36f) 18:37:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x1c, r1, 0x301, 0x0, 0x0, {{0x11}, {@val={0x8}, @void}}}, 0x1c}}, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001280)={&(0x7f0000000300)=ANY=[@ANYBLOB="1400002d0b394cbe6cbeab1600", @ANYRES16=r1, @ANYBLOB], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x24000004) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x181041, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e) close_range(r6, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001300)={&(0x7f0000000180)={0x34, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x47}, @void, @void}}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4008040) fallocate(r5, 0x0, 0x0, 0x8000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280), &(0x7f00000002c0)={'U+', 0x80000000}, 0x16, 0x2) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4, 0x2}) 18:37:50 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:37:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'syztnl2\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x8, 0x8, 0xfffffffa, 0x80, {{0x31, 0x4, 0x1, 0x5, 0xc4, 0x68, 0x0, 0x5, 0x4, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x24, 0xd9, 0x0, 0x3, [0x80000001, 0x5, 0x3ff, 0x18f0, 0xbd59, 0x1, 0x0, 0x7f]}, @lsrr={0x83, 0x7, 0x14, [@empty]}, @cipso={0x86, 0x5f, 0x3, [{0x2, 0x12, "a2f8bd091ad033b590fbb8b90308e12a"}, {0x7, 0x3, "ac"}, {0x2, 0xe, "b52a2410befcc497bc1e90db"}, {0x2, 0xd, "5e94b6b76d5ff5d52128ce"}, {0x2, 0xb, "989fef3afbea0edb08"}, {0x2, 0xe, "e11706b1acfb382c20a0f2b7"}, {0x0, 0x10, "bed46be37ad294e2a36b91b27814"}]}, @timestamp_prespec={0x44, 0x1c, 0x34, 0x3, 0x7, [{@private=0xa010102, 0x1f}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x101}, {@remote, 0x4d8}]}, @rr={0x7, 0x7, 0x73, [@multicast1]}]}}}}}) syz_io_uring_setup(0x72a6, &(0x7f00000001c0)={0x0, 0x5157, 0x20, 0x2, 0x16d}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0xca7d, 0x0, 0x0, 0x3, 0x1}, 0x7) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff], 0x1}, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r3, r5, &(0x7f0000000440)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r0, 0x80, &(0x7f00000003c0)=@l2tp6={0xa, 0x0, 0x7, @mcast1, 0x9}, 0x0, 0x0, 0x1}, 0x1) 18:37:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'syztnl2\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x8, 0x8, 0xfffffffa, 0x80, {{0x31, 0x4, 0x1, 0x5, 0xc4, 0x68, 0x0, 0x5, 0x4, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x24, 0xd9, 0x0, 0x3, [0x80000001, 0x5, 0x3ff, 0x18f0, 0xbd59, 0x1, 0x0, 0x7f]}, @lsrr={0x83, 0x7, 0x14, [@empty]}, @cipso={0x86, 0x5f, 0x3, [{0x2, 0x12, "a2f8bd091ad033b590fbb8b90308e12a"}, {0x7, 0x3, "ac"}, {0x2, 0xe, "b52a2410befcc497bc1e90db"}, {0x2, 0xd, "5e94b6b76d5ff5d52128ce"}, {0x2, 0xb, "989fef3afbea0edb08"}, {0x2, 0xe, "e11706b1acfb382c20a0f2b7"}, {0x0, 0x10, "bed46be37ad294e2a36b91b27814"}]}, @timestamp_prespec={0x44, 0x1c, 0x34, 0x3, 0x7, [{@private=0xa010102, 0x1f}, {@dev={0xac, 0x14, 0x14, 0x13}, 0x101}, {@remote, 0x4d8}]}, @rr={0x7, 0x7, 0x73, [@multicast1]}]}}}}}) syz_io_uring_setup(0x72a6, &(0x7f00000001c0)={0x0, 0x5157, 0x20, 0x2, 0x16d}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000240)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0xca7d, 0x0, 0x0, 0x3, 0x1}, 0x7) syz_io_uring_setup(0x4d4f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff], 0x1}, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r3, r5, &(0x7f0000000440)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r0, 0x80, &(0x7f00000003c0)=@l2tp6={0xa, 0x0, 0x7, @mcast1, 0x9}, 0x0, 0x0, 0x1}, 0x1) 18:37:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES16], 0x1e8}, 0x1, 0x0, 0x0, 0x20000091}, 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000002c0)) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f00000017c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000001a40), &(0x7f0000000400)='./file0\x00', 0x8, 0x1) r3 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000001a00)=0x10, 0x0) pwritev2(r3, &(0x7f00000000c0)=[{&(0x7f0000000480)="145c0b1956e582f2c2ee88f6e2fa1aa5698f120c91d9a1d0f1c00005ad6151f3de2ff93c376af9a26c81d4d22a8fa722d2dfc6d4bfa6eb5f42cd4dfdd45ebf6159a8aed4e3d61f61d33b212485268b342d079996e2062b3be6f28a1183d2d4f414e50b0e08a1a1b6bda900f52e3759ec4a97ba73861b6c54cb0f02b4d72570ad85650a4f69b41f143f0c068a16762da41fe74a2fcf87c0df8e16d3e5907ab45471d6e9579869490c89007da3b3b4988c", 0xb0}, {&(0x7f0000000180)="aa145628a78bc6e786e0357432f2e0b0dd510f364deca2bff8d2432cb646b4baba7176b5e9af4182bba345a3743a45ed6da4e37904f5e69008bdb33d0e3b28b2387d90dc614dfda567d90acf5970bc05934e0240d79ecb7fe94dd4b5d6db9d88ba9e6fa4857105ddce26e02c90fbb07fed9f499d22d46b48504507", 0x7b}, {&(0x7f0000001e00)="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", 0x1019}, {&(0x7f0000001540)="8c9307bde8f0b3e09532dbc1773ba5949b5bd29119a1d6cdf139d06bfee9c71b39aa47bd661ca3588400043eeb5d7f2668ad56f649510334149f0a596da99c220bcf08c5d8099b795046598610cc5c613dc8e2f65dfc47bef86708b035fcefbd0553e1487719338f636a25e825f279d2e7efa3cd8c85e5b94e74a560f9fa3ded9d7365fa3b684f539d57e5843bf3fb358adc7e84a26f2faf415c38dc2f12c773330a360b2c2ad688ebd8b7230b0b22ddf4ef6b9fdc33f64682ea7545e6e5b3ecc7eb7bb707", 0xc5}], 0x4, 0x1000, 0x0, 0x8) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x582, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_IOC_CATATONIC(r4, 0x9362, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0xc0182101, &(0x7f0000000440)={r5}) [ 550.193408] 9pnet: Insufficient options for proto=fd 18:37:50 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:37:50 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:37:50 executing program 0: openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) [ 550.315521] 9pnet: Insufficient options for proto=fd 18:37:50 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 550.358863] 9pnet: Insufficient options for proto=fd 18:37:50 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}}) 18:37:50 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0xf507, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r3) sendmsg$nl_generic(r3, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)={0x274, 0x2a, 0x10, 0x70bd2b, 0x25dfdbfe, {0x2}, [@generic="435236d98e8f5c18558a31eec6784a", @generic="1ebffdfc6f0623244e548cb9d3dd479c72607ebc14aa6f510a1d65f60f6a2dc334762943017dbb35ae449dcd63ae134b0a0d550653aa4806d2c8978423a32ba229a1a1cd72dd56835acbb29cd1194485f543d76f1e8eab806117f29f604b00256e75ac09ab4d43e448d00a676ef8107e25e8a48571bfbeda73a6e591e576219ec9d1a10e68db9cdabedf09a4f05f5f62fe129388aa624b388ec1df0fbf509b567badf6b202903a244a7ba193474d465dbbf21c6487a88bca0895139490638df180a1b42e1165acdfb042f5d30836b7f6a20960f3a339a35748e3328d38f4908f772b", @nested={0x12c, 0x78, 0x0, 0x1, [@generic="221d7fbcc868281002ed71a21339b81dbce216a6e9891408cab9d3d1cb8e26007cc3d1c2ea80d803f570353b2d161e2a29247b7fdc2d90c9", @generic="b2dce29fa3d629cb1e2b51fde0b2b29ce8405e2486d6f38fc574e1ebbd7a03bd76f6f1dd4a9b997542af1336926c04d6c999e165addf131d6213576c88713dede238c11c2c9aa89529f2cf248917f0ce4c", @generic="e0d62f38642f6bf22d42698953f5e80860788d8010c7e5f70e243cdec64aff40134f3bca64d56b36df7d352aed2a9b3f76ed9b191151a3aa4f8e80b09fc06e4dfeec263eadd11d3010c5552349b45e07847f043286101981924a3c9e2b2330ddb64231b4377466907c4a26ba557655842e907bec825471ad8b425e5ccde92976de910170bbd39a9113725177e55de320b1b44128d6aafa", @typed={0x8, 0x65, 0x0, 0x0, @pid}]}, @typed={0xc, 0x53, 0x0, 0x0, @u64=0x7}, @generic="70e43969d12cd37b221ffeb77bb5b91e3f4fa176bdaf821e228d3675ee68c935c0d09ec0685b9771b2b6375ae0c190909c7628011f"]}, 0x274}, 0x1, 0x0, 0x0, 0x40000}, 0x4008840) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000002c0)={0x9, 0xfffffc01, 0x80000000, 0x1, 0x8, "25c37fdf7842b517042d6bca66fe047c6cc338", 0x800, 0x1}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 550.393449] 9pnet: Insufficient options for proto=fd [ 550.971991] debugfs: Directory 'loop0' with parent 'block' already present! 18:38:04 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0xf507, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r3) sendmsg$nl_generic(r3, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)={0x274, 0x2a, 0x10, 0x70bd2b, 0x25dfdbfe, {0x2}, [@generic="435236d98e8f5c18558a31eec6784a", @generic="1ebffdfc6f0623244e548cb9d3dd479c72607ebc14aa6f510a1d65f60f6a2dc334762943017dbb35ae449dcd63ae134b0a0d550653aa4806d2c8978423a32ba229a1a1cd72dd56835acbb29cd1194485f543d76f1e8eab806117f29f604b00256e75ac09ab4d43e448d00a676ef8107e25e8a48571bfbeda73a6e591e576219ec9d1a10e68db9cdabedf09a4f05f5f62fe129388aa624b388ec1df0fbf509b567badf6b202903a244a7ba193474d465dbbf21c6487a88bca0895139490638df180a1b42e1165acdfb042f5d30836b7f6a20960f3a339a35748e3328d38f4908f772b", @nested={0x12c, 0x78, 0x0, 0x1, [@generic="221d7fbcc868281002ed71a21339b81dbce216a6e9891408cab9d3d1cb8e26007cc3d1c2ea80d803f570353b2d161e2a29247b7fdc2d90c9", @generic="b2dce29fa3d629cb1e2b51fde0b2b29ce8405e2486d6f38fc574e1ebbd7a03bd76f6f1dd4a9b997542af1336926c04d6c999e165addf131d6213576c88713dede238c11c2c9aa89529f2cf248917f0ce4c", @generic="e0d62f38642f6bf22d42698953f5e80860788d8010c7e5f70e243cdec64aff40134f3bca64d56b36df7d352aed2a9b3f76ed9b191151a3aa4f8e80b09fc06e4dfeec263eadd11d3010c5552349b45e07847f043286101981924a3c9e2b2330ddb64231b4377466907c4a26ba557655842e907bec825471ad8b425e5ccde92976de910170bbd39a9113725177e55de320b1b44128d6aafa", @typed={0x8, 0x65, 0x0, 0x0, @pid}]}, @typed={0xc, 0x53, 0x0, 0x0, @u64=0x7}, @generic="70e43969d12cd37b221ffeb77bb5b91e3f4fa176bdaf821e228d3675ee68c935c0d09ec0685b9771b2b6375ae0c190909c7628011f"]}, 0x274}, 0x1, 0x0, 0x0, 0x40000}, 0x4008840) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000002c0)={0x9, 0xfffffc01, 0x80000000, 0x1, 0x8, "25c37fdf7842b517042d6bca66fe047c6cc338", 0x800, 0x1}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 18:38:04 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES16], 0x1e8}, 0x1, 0x0, 0x0, 0x20000091}, 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000002c0)) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f00000017c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) setxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000001a40), &(0x7f0000000400)='./file0\x00', 0x8, 0x1) r3 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000001a00)=0x10, 0x0) pwritev2(r3, &(0x7f00000000c0)=[{&(0x7f0000000480)="145c0b1956e582f2c2ee88f6e2fa1aa5698f120c91d9a1d0f1c00005ad6151f3de2ff93c376af9a26c81d4d22a8fa722d2dfc6d4bfa6eb5f42cd4dfdd45ebf6159a8aed4e3d61f61d33b212485268b342d079996e2062b3be6f28a1183d2d4f414e50b0e08a1a1b6bda900f52e3759ec4a97ba73861b6c54cb0f02b4d72570ad85650a4f69b41f143f0c068a16762da41fe74a2fcf87c0df8e16d3e5907ab45471d6e9579869490c89007da3b3b4988c", 0xb0}, {&(0x7f0000000180)="aa145628a78bc6e786e0357432f2e0b0dd510f364deca2bff8d2432cb646b4baba7176b5e9af4182bba345a3743a45ed6da4e37904f5e69008bdb33d0e3b28b2387d90dc614dfda567d90acf5970bc05934e0240d79ecb7fe94dd4b5d6db9d88ba9e6fa4857105ddce26e02c90fbb07fed9f499d22d46b48504507", 0x7b}, {&(0x7f0000001e00)="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", 0x1019}, {&(0x7f0000001540)="8c9307bde8f0b3e09532dbc1773ba5949b5bd29119a1d6cdf139d06bfee9c71b39aa47bd661ca3588400043eeb5d7f2668ad56f649510334149f0a596da99c220bcf08c5d8099b795046598610cc5c613dc8e2f65dfc47bef86708b035fcefbd0553e1487719338f636a25e825f279d2e7efa3cd8c85e5b94e74a560f9fa3ded9d7365fa3b684f539d57e5843bf3fb358adc7e84a26f2faf415c38dc2f12c773330a360b2c2ad688ebd8b7230b0b22ddf4ef6b9fdc33f64682ea7545e6e5b3ecc7eb7bb707", 0xc5}], 0x4, 0x1000, 0x0, 0x8) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x582, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7, 0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_IOC_CATATONIC(r4, 0x9362, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0xc0182101, &(0x7f0000000440)={r5}) 18:38:04 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x1c, r1, 0x301, 0x0, 0x0, {{0x11}, {@val={0x8}, @void}}}, 0x1c}}, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001280)={&(0x7f0000000300)=ANY=[@ANYBLOB="1400002d0b394cbe6cbeab1600", @ANYRES16=r1, @ANYBLOB], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x24000004) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x181041, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e) close_range(r6, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001300)={&(0x7f0000000180)={0x34, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x47}, @void, @void}}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4008040) fallocate(r5, 0x0, 0x0, 0x8000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280), &(0x7f00000002c0)={'U+', 0x80000000}, 0x16, 0x2) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4, 0x2}) 18:38:04 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}}) 18:38:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x4, &(0x7f0000001540)) socket$inet6_tcp(0xa, 0x1, 0x0) 18:38:04 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:04 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 563.791162] 9pnet: Insufficient options for proto=fd 18:38:04 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x82801) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x9, 0x7, 0x80000000, 0x2, 0x3, 0x2, 0x3ca, 0x40, 0x243, 0x40, 0x928, 0x38, 0x2, 0x333, 0x7, 0x86}, [{0x0, 0x3, 0x81, 0xffffffff00000000, 0x0, 0x7ff, 0x3ff, 0x4}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1a78) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x810, r2, 0xffffffff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) ioctl$SG_NEXT_CMD_LEN(r4, 0x2203, &(0x7f0000000000)) 18:38:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, &(0x7f0000000080)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = dup2(0xffffffffffffffff, r1) accept4$inet6(r2, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x800) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44000}, 0xc840) socket$nl_xfrm(0x10, 0x3, 0x6) openat(r2, 0x0, 0x181000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fcntl$setpipe(r3, 0x407, 0x5) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e23, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}, {0xa, 0x4e24, 0x3ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x6}, 0x1, [0x6718, 0x3, 0x8, 0x9, 0x2, 0x8000, 0x400, 0xa266]}, 0x5c) 18:38:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000011300)=ANY=[]) open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000) 18:38:04 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 1) [ 564.013104] FAULT_INJECTION: forcing a failure. [ 564.013104] name failslab, interval 1, probability 0, space 0, times 1 [ 564.015514] CPU: 1 PID: 5951 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 564.016953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 564.018754] Call Trace: [ 564.019319] dump_stack+0x107/0x167 [ 564.020084] should_fail.cold+0x5/0xa [ 564.020896] should_failslab+0x5/0x20 [ 564.021704] __kmalloc_track_caller+0x79/0x3c0 [ 564.022663] ? strndup_user+0x74/0xe0 [ 564.023471] memdup_user+0x22/0xd0 [ 564.024219] strndup_user+0x74/0xe0 [ 564.024986] __x64_sys_mount+0x133/0x300 [ 564.025853] ? path_mount+0x20b0/0x20b0 [ 564.026695] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 564.027796] ? syscall_enter_from_user_mode+0x1d/0x50 [ 564.028882] do_syscall_64+0x33/0x40 [ 564.029672] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 564.030743] RIP: 0033:0x7f3dafdedb19 [ 564.031520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.035608] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 564.037470] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 564.039541] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 564.041402] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 564.043246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 564.044973] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:04 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 2) [ 564.227745] FAULT_INJECTION: forcing a failure. [ 564.227745] name failslab, interval 1, probability 0, space 0, times 0 [ 564.229749] CPU: 0 PID: 5954 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 564.230913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 564.232322] Call Trace: [ 564.232775] dump_stack+0x107/0x167 [ 564.233407] should_fail.cold+0x5/0xa [ 564.234054] ? create_object.isra.0+0x3a/0xa20 [ 564.234847] should_failslab+0x5/0x20 [ 564.235489] kmem_cache_alloc+0x5b/0x360 [ 564.236188] create_object.isra.0+0x3a/0xa20 [ 564.236946] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 564.237825] __kmalloc_track_caller+0x177/0x3c0 [ 564.238621] ? strndup_user+0x74/0xe0 [ 564.239283] memdup_user+0x22/0xd0 [ 564.239874] strndup_user+0x74/0xe0 [ 564.240498] __x64_sys_mount+0x133/0x300 [ 564.241183] ? path_mount+0x20b0/0x20b0 [ 564.241888] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 564.242784] ? syscall_enter_from_user_mode+0x1d/0x50 [ 564.243662] do_syscall_64+0x33/0x40 [ 564.244299] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 564.245178] RIP: 0033:0x7f3dafdedb19 [ 564.245826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.248934] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 564.250218] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 564.251437] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 564.252642] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 564.253844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 564.255046] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:05 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 3) 18:38:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)="3c9429004cefc7cd6a057f", 0xb}], 0x1, 0x6) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000100)={0x0, @aes256, 0x0, @desc3}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x7, 0x1, 0x7, 0x722d, 0x6, "a7b2136a611a21809f7761db48b44dd7ef7392"}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000002c0)={0x4, "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"}) [ 564.439430] FAULT_INJECTION: forcing a failure. [ 564.439430] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 564.441359] CPU: 0 PID: 5957 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 564.442471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 564.443799] Call Trace: [ 564.444226] dump_stack+0x107/0x167 [ 564.444813] should_fail.cold+0x5/0xa [ 564.445436] _copy_from_user+0x2e/0x1b0 [ 564.446089] memdup_user+0x65/0xd0 [ 564.446660] strndup_user+0x74/0xe0 [ 564.447251] __x64_sys_mount+0x133/0x300 [ 564.447908] ? path_mount+0x20b0/0x20b0 [ 564.448554] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 564.449394] ? syscall_enter_from_user_mode+0x1d/0x50 [ 564.450223] do_syscall_64+0x33/0x40 [ 564.450819] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 564.451638] RIP: 0033:0x7f3dafdedb19 [ 564.452233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.455210] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 564.456446] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 564.457600] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 564.458731] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 564.459862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 564.461000] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:05 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 4) [ 564.546846] FAULT_INJECTION: forcing a failure. [ 564.546846] name failslab, interval 1, probability 0, space 0, times 0 [ 564.548639] CPU: 0 PID: 5959 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 564.549739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 564.551062] Call Trace: [ 564.551493] dump_stack+0x107/0x167 [ 564.552068] should_fail.cold+0x5/0xa [ 564.552677] ? copy_mount_options+0x55/0x180 [ 564.553383] should_failslab+0x5/0x20 [ 564.553988] kmem_cache_alloc_trace+0x55/0x360 [ 564.554707] ? _copy_from_user+0xfb/0x1b0 [ 564.555360] copy_mount_options+0x55/0x180 [ 564.556032] __x64_sys_mount+0x1a8/0x300 [ 564.556672] ? path_mount+0x20b0/0x20b0 [ 564.557304] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 564.558156] ? syscall_enter_from_user_mode+0x1d/0x50 [ 564.558969] do_syscall_64+0x33/0x40 18:38:05 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x1) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x2, "77004a6efdff0000000008002600", 0xffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000180)={0x80000000, 0x7ff, 0xef4, 0x9, 0x9, "b357622ab67d7be239ebb1adca4ba169486f12"}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x8, 0x3, 0x9, 0x5, 0x0, 0x8, 0x11000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x58000, 0x4, 0x2, 0x1, 0x1, 0x3, 0xfffb, 0x0, 0x370, 0x0, 0x7ff}, r3, 0x5, r0, 0xb) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/230, 0xe6, 0x2) r5 = socket$inet(0x2, 0xa, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44400) io_submit(r6, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x4000}]) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r5, r4, 0x0) [ 564.559561] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 564.560579] RIP: 0033:0x7f3dafdedb19 [ 564.561163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.564040] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 564.565238] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 564.566378] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 564.567512] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 564.568650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 564.569798] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:05 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:05 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 5) [ 564.689928] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 564.694034] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 564.695715] FAT-fs (loop5): Filesystem has been set read-only [ 564.720337] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 564.725492] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 564.727166] FAT-fs (loop5): Filesystem has been set read-only [ 564.764106] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 18:38:05 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 564.799072] FAULT_INJECTION: forcing a failure. [ 564.799072] name failslab, interval 1, probability 0, space 0, times 0 [ 564.801975] CPU: 0 PID: 5977 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 564.803228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 564.804721] Call Trace: [ 564.805197] dump_stack+0x107/0x167 [ 564.805863] should_fail.cold+0x5/0xa [ 564.806546] ? create_object.isra.0+0x3a/0xa20 [ 564.807483] should_failslab+0x5/0x20 [ 564.808165] kmem_cache_alloc+0x5b/0x360 [ 564.808893] create_object.isra.0+0x3a/0xa20 [ 564.809698] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 564.810627] kmem_cache_alloc_trace+0x151/0x360 [ 564.811476] copy_mount_options+0x55/0x180 18:38:05 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 564.812235] __x64_sys_mount+0x1a8/0x300 [ 564.813018] ? path_mount+0x20b0/0x20b0 [ 564.813757] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 564.814680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 564.815591] do_syscall_64+0x33/0x40 [ 564.816257] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 564.817191] RIP: 0033:0x7f3dafdedb19 [ 564.817849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 564.821246] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 564.822607] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 564.823927] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 564.825179] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 564.826483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 564.827795] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:05 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 564.973329] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 564.975047] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/37/file0 supports timestamps until 2038 (0x7fffffff) [ 565.015172] 9pnet: Insufficient options for proto=fd [ 565.204013] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 565.208094] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/40/file0 supports timestamps until 2038 (0x7fffffff) [ 565.241469] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 565.243168] ext4 filesystem being mounted at /syzkaller-testdir037038886/syzkaller.DKOSF4/41/file0 supports timestamps until 2038 (0x7fffffff) 18:38:19 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x1) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x2, "77004a6efdff0000000008002600", 0xffffffff}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000180)={0x80000000, 0x7ff, 0xef4, 0x9, 0x9, "b357622ab67d7be239ebb1adca4ba169486f12"}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x8, 0x3, 0x9, 0x5, 0x0, 0x8, 0x11000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x9}, 0x58000, 0x4, 0x2, 0x1, 0x1, 0x3, 0xfffb, 0x0, 0x370, 0x0, 0x7ff}, r3, 0x5, r0, 0xb) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/230, 0xe6, 0x2) r5 = socket$inet(0x2, 0xa, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44400) io_submit(r6, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x4000}]) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r5, r4, 0x0) 18:38:19 executing program 7: fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000003500), &(0x7f0000003d00)=0xc) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0xa8000, 0x0) recvmmsg$unix(r0, &(0x7f0000003a00)=[{{&(0x7f0000000040), 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/95, 0x5f}, {&(0x7f0000000140)=""/75, 0x4b}, {&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f00000003c0)=""/196, 0xc4}, {&(0x7f00000004c0)=""/232, 0xe8}, {&(0x7f00000001c0)}], 0x6, &(0x7f00000005c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000680)=""/246, 0xf6}, {&(0x7f0000000780)=""/192, 0xc0}, {&(0x7f0000000840)=""/135, 0x87}, {&(0x7f0000000900)=""/10, 0xa}, {&(0x7f0000000940)=""/76, 0x4c}, {&(0x7f00000009c0)=""/33, 0x21}], 0x6, &(0x7f0000000a80)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000000b40), 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000bc0)=""/86, 0x56}, {&(0x7f0000000c40)=""/172, 0xac}, {&(0x7f0000000d00)=""/151, 0x97}], 0x3, &(0x7f0000000e00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x58}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e80)=""/187, 0xbb}, {&(0x7f0000000f40)=""/171, 0xab}], 0x2}}, {{&(0x7f0000001040)=@abs, 0x6e, &(0x7f00000021c0)=[{&(0x7f00000010c0)=""/149, 0x95}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000002180)=""/37, 0x25}], 0x3, &(0x7f0000002200)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/211, 0xd3}, {&(0x7f00000033c0)=""/130, 0x82}, {&(0x7f0000003480)}], 0x4, &(0x7f0000003500)}}, {{&(0x7f0000003540), 0x6e, &(0x7f0000003840)=[{&(0x7f00000035c0)=""/36, 0x24}, {&(0x7f0000003600)=""/200, 0xc8}, {&(0x7f0000003700)=""/238, 0xee}, {&(0x7f0000003800)=""/23, 0x17}], 0x4, &(0x7f0000003880)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x148}}], 0x7, 0x140, &(0x7f0000003bc0)) syz_open_procfs(r1, &(0x7f0000003c00)='net/snmp\x00') r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x2480, 0x0) readv(r2, &(0x7f0000003480)=[{&(0x7f0000003c40)=""/145, 0x91}], 0x1) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EXT4_IOC_GETSTATE(r3, 0x40046629, &(0x7f0000000000)) 18:38:19 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:19 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 6) 18:38:19 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:19 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:19 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, r0, 0x0) getsockname$unix(r1, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0xc96dc0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000340)={0x4, 0xfe1, 0x800, 0xfffffffd, 0x10, "4d5c0e3d830cc80e4d49624d9fac32f023f646", 0xa119, 0x2}) getpeername$unix(r1, &(0x7f0000000380)=@abs, &(0x7f0000000280)=0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x9, 0x401, 0x7, 0x4, 0x7, "9c6549600d94a8ce2c977a638896994d263c6f"}) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) r3 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) dup3(r4, r5, 0x0) getpeername$unix(r0, &(0x7f00000002c0), &(0x7f00000000c0)=0x6e) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000001d0000080000006cb1570400b6737c4fd0d65a02ab2d57dd377cdfa238d082446174347bfd63f3590f164e82acc3df30f0c7011b46f0b231b1bc2cba469d7e737685847f0000000000fcffffffffffffff00"/102], 0x1c}}, 0x0) [ 579.160168] FAULT_INJECTION: forcing a failure. [ 579.160168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 579.162594] CPU: 0 PID: 6017 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 579.164012] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 579.165765] Call Trace: [ 579.166334] dump_stack+0x107/0x167 [ 579.167118] should_fail.cold+0x5/0xa 18:38:19 executing program 6: open(&(0x7f0000000040)='./file0\x00', 0x1a18c1, 0x0) stat(&(0x7f0000001900)='./file0/file0/file0\x00', &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000440)=[{&(0x7f0000000180)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000d5f4655fd6f4655f0100ffff53ef010001000000d5f4745f000000000000000001000000000000000b00000000019050247a6c8d235888619da0d06c366f0e7e7feaba017156c9d994b00ea16f6bdaf61e8093e83eaddd7764440e6e1ddc70af4ca358d16d930a1d925e689c21fcc4b6b5958ea05f38ab26ceb66251b9f4256b3823754ab9a62adca7e910ef539029638242b5541fb78a339fd7c2ae86e011c97a660a24cae3e1ed", 0xd4, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000140)="ed41000000080000d5f4655fd5f4655fd5f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)={[{@nombcache}], [{@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, ':!,(('}}, {@context={'context', 0x3d, 'root'}}, {@seclabel}, {@euid_lt={'euid<', r0}}]}) [ 579.167939] _copy_from_user+0x2e/0x1b0 [ 579.168879] copy_mount_options+0x76/0x180 [ 579.169789] __x64_sys_mount+0x1a8/0x300 [ 579.170622] ? path_mount+0x20b0/0x20b0 [ 579.171446] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 579.172520] ? syscall_enter_from_user_mode+0x1d/0x50 [ 579.173587] do_syscall_64+0x33/0x40 [ 579.174353] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 579.175401] RIP: 0033:0x7f3dafdedb19 [ 579.176175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 579.179999] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 579.181592] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 579.183063] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 579.184531] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 579.186003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 579.187463] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:19 executing program 7: alarm(0x6) alarm(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r0, &(0x7f0000000100)=""/62, 0x3e) [ 579.685202] EXT4-fs (loop6): Unrecognized mount option "subj_type=ext2" or missing value [ 579.759426] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 579.759491] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 579.761528] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/41/file0 supports timestamps until 2038 (0x7fffffff) [ 579.773778] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/38/file0 supports timestamps until 2038 (0x7fffffff) 18:38:37 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 7) 18:38:37 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x40000003ff, 0x40202) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp(r1, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r3) ioctl$LOOP_CLR_FD(r3, 0x4c01) clone3(&(0x7f0000000380)={0x8000000, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), {0x2d}, &(0x7f0000000140)=""/181, 0xb5, &(0x7f0000000200)=""/193, &(0x7f0000000340)=[r1, 0x0, r2, 0x0], 0x4, {r3}}, 0x58) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={0x0}) 18:38:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c0004002e000101000080080000254bcd8c6d8a48b256b4cedffe0c00"/42, @ANYRES32=0x0, @ANYBLOB='\f\x00'/12], 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) r1 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x4000000, 0x0, 0x8000000, 0x8008c, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000002a40)=0x0) io_uring_enter(r1, 0x76d3, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x400401, 0x17) r6 = dup2(r5, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r6, 0x0, &(0x7f0000000240)=""/61, 0x3d}, 0x9) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x2b, &(0x7f0000000700)=ANY=[@ANYBLOB="00000400000000003dda8d5c787e6876a95223d985f0e382e72428100d6d5997ad50b6087bc9137ea00ac7d99c0157005b43e30a7a8be8b4d8adc234b69d6acfd40773fd5387d42dab52b4a9aa629e9f9b4ffbfa6a345950d6db1d98077d515d01c6d66c4166695cceb0a41465afea19055d2fecef4223ae1a11670452c2d252598c826c78cfd710276a35c15553fb77b57627399bd8c23f4a7ee7e6d721b01b18d8d036629c96a7d110b3858021acf34077ff181bbacc2f3897594cb3e097ba28ac991562ffdcd5942faf85940bd9754bf19c03e937bd646c2cbc23cb4622496b58c9354d29fd4ac61ea180"], 0x20000148) syz_io_uring_submit(0x0, r2, &(0x7f00000006c0)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x2000, @fd_index=0x6, 0x8, 0x0, 0x0, 0x1, 0x0, {0x1}}, 0x7) read(r1, &(0x7f0000000140)=""/205, 0xcd) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000280)=""/173) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfec4) pwritev2(r7, &(0x7f00000003c0), 0x0, 0x0, 0x80, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 18:38:37 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:38:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETS2(r0, 0x5410, &(0x7f0000000000)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000080)) 18:38:37 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:37 executing program 7: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0xb0, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4004}, 0x20) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x21008, 0x0) mount(0x0, &(0x7f0000000140)='./file1\x00', 0x0, 0x204025, 0x0) 18:38:37 executing program 3: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) msgrcv(0x0, 0x0, 0x0, 0x0, 0x800) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0/file0\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000280)={0x13, 0x32, 0x0, 0x8, 0x9, 0x7, 0x6, 0x140, 0x57c371147aca7cca}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffff0ef, 0x11}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(0xffffffffffffffff, r1) fcntl$dupfd(r2, 0x406, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff01907103c1df3928cb15b27437eb6e994", 0x89, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x8, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 596.862175] FAULT_INJECTION: forcing a failure. [ 596.862175] name failslab, interval 1, probability 0, space 0, times 0 [ 596.864601] CPU: 0 PID: 6070 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 596.866008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 596.867680] Call Trace: [ 596.868222] dump_stack+0x107/0x167 [ 596.868974] should_fail.cold+0x5/0xa [ 596.869753] ? getname_flags.part.0+0x50/0x4f0 [ 596.870704] should_failslab+0x5/0x20 [ 596.871477] kmem_cache_alloc+0x5b/0x360 [ 596.872321] getname_flags.part.0+0x50/0x4f0 [ 596.873317] ? _copy_from_user+0xfb/0x1b0 [ 596.874201] user_path_at_empty+0xa1/0x100 [ 596.875078] __x64_sys_mount+0x1e9/0x300 [ 596.875911] ? path_mount+0x20b0/0x20b0 [ 596.876739] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 596.877835] ? syscall_enter_from_user_mode+0x1d/0x50 [ 596.878903] do_syscall_64+0x33/0x40 [ 596.879677] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 596.880731] RIP: 0033:0x7f3dafdedb19 [ 596.881500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 596.885253] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 596.886824] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 596.888277] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 596.889732] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 596.891215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 596.892680] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:37 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x40000003ff, 0x40202) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp(r1, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r3) ioctl$LOOP_CLR_FD(r3, 0x4c01) clone3(&(0x7f0000000380)={0x8000000, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), {0x2d}, &(0x7f0000000140)=""/181, 0xb5, &(0x7f0000000200)=""/193, &(0x7f0000000340)=[r1, 0x0, r2, 0x0], 0x4, {r3}}, 0x58) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={0x0}) 18:38:37 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:37 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 8) 18:38:37 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x6, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) r1 = socket$inet(0x2, 0xb, 0x7) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) shutdown(r1, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/219, 0xfffffffffffffef3, 0x12140, &(0x7f0000000400)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24, 0x3}}, 0xfffffe79) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e21, @multicast2}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="08000000001200002e2f66696c653000"]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, &(0x7f0000000180)) r3 = getuid() ioprio_set$uid(0x0, r3, 0x0) r4 = semget$private(0x0, 0x2, 0x1) r5 = getegid() semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000002c0)={{0x3, 0xee01, r5, 0xffffffffffffffff, 0xee01, 0xc8, 0x6}, 0x5, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x6}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000001780)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3, r5}}, './file0\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1c1e02, 0x0) ioctl$CDROMRESET(r6, 0x5329) unshare(0x48020200) [ 597.037120] FAULT_INJECTION: forcing a failure. [ 597.037120] name failslab, interval 1, probability 0, space 0, times 0 [ 597.039431] CPU: 1 PID: 6084 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 597.040837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 597.042553] Call Trace: [ 597.043099] dump_stack+0x107/0x167 [ 597.043849] should_fail.cold+0x5/0xa [ 597.044646] ? create_object.isra.0+0x3a/0xa20 [ 597.045597] should_failslab+0x5/0x20 [ 597.046397] kmem_cache_alloc+0x5b/0x360 [ 597.047254] create_object.isra.0+0x3a/0xa20 [ 597.048170] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 597.049241] kmem_cache_alloc+0x159/0x360 [ 597.050123] getname_flags.part.0+0x50/0x4f0 [ 597.051046] ? _copy_from_user+0xfb/0x1b0 [ 597.051914] user_path_at_empty+0xa1/0x100 [ 597.052802] __x64_sys_mount+0x1e9/0x300 [ 597.053644] ? path_mount+0x20b0/0x20b0 [ 597.054481] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 597.055570] ? syscall_enter_from_user_mode+0x1d/0x50 [ 597.056645] do_syscall_64+0x33/0x40 [ 597.057384] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 597.058417] RIP: 0033:0x7f3dafdedb19 [ 597.059167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 597.062838] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 597.064374] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 597.065824] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 597.067265] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 597.068709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 597.070163] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 597.689000] EXT4-fs: failed to create workqueue [ 597.690264] EXT4-fs (loop4): mount failed [ 597.825617] EXT4-fs error (device loop3): ext4_orphan_get:1413: comm syz-executor.3: bad orphan inode 301979167 [ 597.830355] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 598.446857] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 598.448857] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/43/file0 supports timestamps until 2038 (0x7fffffff) 18:38:51 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 9) 18:38:51 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x6, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) r1 = socket$inet(0x2, 0xb, 0x7) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) shutdown(r1, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/219, 0xfffffffffffffef3, 0x12140, &(0x7f0000000400)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24, 0x3}}, 0xfffffe79) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e21, @multicast2}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="08000000001200002e2f66696c653000"]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, &(0x7f0000000180)) r3 = getuid() ioprio_set$uid(0x0, r3, 0x0) r4 = semget$private(0x0, 0x2, 0x1) r5 = getegid() semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000002c0)={{0x3, 0xee01, r5, 0xffffffffffffffff, 0xee01, 0xc8, 0x6}, 0x5, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x6}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000001780)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3, r5}}, './file0\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1c1e02, 0x0) ioctl$CDROMRESET(r6, 0x5329) unshare(0x48020200) 18:38:51 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x6, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) r1 = socket$inet(0x2, 0xb, 0x7) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) shutdown(r1, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/219, 0xfffffffffffffef3, 0x12140, &(0x7f0000000400)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24, 0x3}}, 0xfffffe79) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e21, @multicast2}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="08000000001200002e2f66696c653000"]) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, &(0x7f0000000180)) r3 = getuid() ioprio_set$uid(0x0, r3, 0x0) r4 = semget$private(0x0, 0x2, 0x1) r5 = getegid() semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f00000002c0)={{0x3, 0xee01, r5, 0xffffffffffffffff, 0xee01, 0xc8, 0x6}, 0x5, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x6}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000001780)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3, r5}}, './file0\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1c1e02, 0x0) ioctl$CDROMRESET(r6, 0x5329) unshare(0x48020200) 18:38:51 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:38:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c0004002e000101000080080000254bcd8c6d8a48b256b4cedffe0c00"/42, @ANYRES32=0x0, @ANYBLOB='\f\x00'/12], 0x2c}, 0x1, 0x0, 0x0, 0xa0}, 0x0) r1 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x4000000, 0x0, 0x8000000, 0x8008c, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000002a40)=0x0) io_uring_enter(r1, 0x76d3, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r4, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x400401, 0x17) r6 = dup2(r5, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r6, 0x0, &(0x7f0000000240)=""/61, 0x3d}, 0x9) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x2b, &(0x7f0000000700)=ANY=[@ANYBLOB="00000400000000003dda8d5c787e6876a95223d985f0e382e72428100d6d5997ad50b6087bc9137ea00ac7d99c0157005b43e30a7a8be8b4d8adc234b69d6acfd40773fd5387d42dab52b4a9aa629e9f9b4ffbfa6a345950d6db1d98077d515d01c6d66c4166695cceb0a41465afea19055d2fecef4223ae1a11670452c2d252598c826c78cfd710276a35c15553fb77b57627399bd8c23f4a7ee7e6d721b01b18d8d036629c96a7d110b3858021acf34077ff181bbacc2f3897594cb3e097ba28ac991562ffdcd5942faf85940bd9754bf19c03e937bd646c2cbc23cb4622496b58c9354d29fd4ac61ea180"], 0x20000148) syz_io_uring_submit(0x0, r2, &(0x7f00000006c0)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x2000, @fd_index=0x6, 0x8, 0x0, 0x0, 0x1, 0x0, {0x1}}, 0x7) read(r1, &(0x7f0000000140)=""/205, 0xcd) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000280)=""/173) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfec4) pwritev2(r7, &(0x7f00000003c0), 0x0, 0x0, 0x80, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 18:38:51 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x40000003ff, 0x40202) r1 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp(r1, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000080)=""/154, 0x9a}], 0x1, 0x0, 0x0) kcmp(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r3) ioctl$LOOP_CLR_FD(r3, 0x4c01) clone3(&(0x7f0000000380)={0x8000000, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), {0x2d}, &(0x7f0000000140)=""/181, 0xb5, &(0x7f0000000200)=""/193, &(0x7f0000000340)=[r1, 0x0, r2, 0x0], 0x4, {r3}}, 0x58) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={0x0}) 18:38:51 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:51 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 611.374075] FAULT_INJECTION: forcing a failure. [ 611.374075] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 611.375557] CPU: 0 PID: 6130 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 611.376284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 611.377368] Call Trace: [ 611.377725] dump_stack+0x107/0x167 [ 611.378220] should_fail.cold+0x5/0xa [ 611.378730] strncpy_from_user+0x34/0x470 [ 611.379287] getname_flags.part.0+0x95/0x4f0 [ 611.379872] ? _copy_from_user+0xfb/0x1b0 [ 611.380425] user_path_at_empty+0xa1/0x100 [ 611.380990] __x64_sys_mount+0x1e9/0x300 [ 611.381521] ? path_mount+0x20b0/0x20b0 [ 611.381943] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 611.382649] ? syscall_enter_from_user_mode+0x1d/0x50 [ 611.383285] do_syscall_64+0x33/0x40 [ 611.383712] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 611.384283] RIP: 0033:0x7f3dafdedb19 [ 611.384704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.386740] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 611.387581] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 611.388385] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 611.389226] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 611.390086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 611.390936] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:52 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 10) 18:38:52 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:38:52 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:38:52 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 611.884444] FAULT_INJECTION: forcing a failure. [ 611.884444] name failslab, interval 1, probability 0, space 0, times 0 [ 611.887039] CPU: 1 PID: 6153 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 611.888573] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 611.890420] Call Trace: [ 611.891003] dump_stack+0x107/0x167 [ 611.891829] should_fail.cold+0x5/0xa [ 611.892677] ? alloc_fs_context+0x57/0x840 [ 611.893614] should_failslab+0x5/0x20 [ 611.894475] kmem_cache_alloc_trace+0x55/0x360 [ 611.895528] alloc_fs_context+0x57/0x840 [ 611.896442] path_mount+0xa72/0x20b0 [ 611.897273] ? strncpy_from_user+0x9e/0x470 [ 611.898244] ? finish_automount+0xa40/0xa40 [ 611.899216] ? getname_flags.part.0+0x1dd/0x4f0 [ 611.900232] ? _copy_from_user+0xfb/0x1b0 [ 611.901166] __x64_sys_mount+0x282/0x300 [ 611.902065] ? path_mount+0x20b0/0x20b0 [ 611.902947] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 611.904113] ? syscall_enter_from_user_mode+0x1d/0x50 [ 611.905252] do_syscall_64+0x33/0x40 [ 611.906067] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 611.907203] RIP: 0033:0x7f3dafdedb19 [ 611.908009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 611.911984] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 611.913665] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 611.915240] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 611.916803] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 611.918378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 611.919933] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 611.951535] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 611.955196] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 611.957243] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/40/file0 supports timestamps until 2038 (0x7fffffff) [ 611.960298] ext4 filesystem being mounted at /syzkaller-testdir037038886/syzkaller.DKOSF4/44/file0 supports timestamps until 2038 (0x7fffffff) 18:38:52 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 11) 18:38:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1000000, 0x4) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x1, 0x800, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3fefc4327c35d5f4c097347fb24dc1b3b1ba18171798bdc0062ea0b5e364eee2b3dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="4804000000138900d800000000000000fd24000000000000", 0x18}, {&(0x7f0000000b40)="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", 0xfe2}], 0x2}, 0x0) 18:38:52 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:52 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x14800, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="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"/1408, 0x580, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e0000000000001e00080000000008007809140b2a3a08020000010000010100002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000730079007a006b0061006c006c006500720020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000200020002000470045004e00490053004f0049004d004100470045002000490053004f00200039003600360030005f004800460053002000460049004c004500530059005300540045004d002000430052004500410054004f005200200028004300290020003100390039003300200045002e0059004f0055004e004700440041004c004500660069006c0065003300200020002000200020002000200020002000200020002000200000660069006c0065003100200020002000200020002000200020002000200020002000200000660069006c0065003200200020002000200020002000200020002000200020002000200032303230303932303131343235383030083230323030393230313134323538303008303030303030303030303030303030300032303230303932303131343235383030080100202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202000"/1408, 0x580, 0x8800}, {&(0x7f0000000040)="ff4344f50fdb213268ae105c3030310100000000000000000000000000000100000000000000400000", 0x29, 0x9000}, {&(0x7f0000010d00)="01001c0000000100000005001d000000010046494c4530000000000000000000", 0x20, 0xa000}, {&(0x7f0000010e00)="01000000001c0001000005000000001d000146494c4530000000000000000000", 0x20, 0xb000}, {&(0x7f0000010f00)="01001e000000010000000a001f000000010000660069006c0065003000000000", 0x20, 0xc000}, {&(0x7f0000011000)="01000000001e000100000a000000001f000100660069006c0065003000000000", 0x20, 0xd000}, {&(0x7f0000011100)="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", 0x380, 0xe000}, {&(0x7f0000011500)="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", 0x200, 0xe800}, {&(0x7f0000011700)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400210000000000002164000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c001f0000000000001f00080000000008007809140b2a3a08020000010000010a00660069006c00650030002c0022000000000000220a0000000000000a7809140b2a3a08000000010000010a00660069006c00650031002c00230000000000002328230000000023287809140b2a3a08000000010000010a00660069006c00650032002c00230000000000002328230000000023287809140b2a3a08000000010000010a00660069006c0065003300"/320, 0x140, 0xf000}, {&(0x7f0000011900)="22001f0000000000001f00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101012c0028000000000000281a0400000000041a7809140b2a3a08000000010000010a00660069006c00650030002c00290000000000002900000000000000007809140b2a3a08000000010000010a00660069006c006500310000000000", 0xa0, 0xf800}, {&(0x7f0000011a00)="4552ed010a548701525249505f313939314154484520524f434b20524944474520494e5445524348414e47452050524f544f434f4c2050524f564944455320535550504f525420464f5220504f5349582046494c452053595354454d2053454d414e54494353504c4541534520434f4e544143542044495343205055424c495348455220464f522053504543494649434154494f4e20534f555243452e2020534545205055424c4953484552204944454e54494649455220494e205052494d41525920564f4c554d452044455343524950544f5220464f5220434f4e5441435420494e464f524d4154494f4e2e00"/256, 0x100, 0x10000}, {&(0x7f0000011b00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x10800}, {&(0x7f0000011c00)='syzkallers\x00'/32, 0x20, 0x11000}, {&(0x7f0000011d00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x14000}], 0x0, &(0x7f0000012200)) [ 612.628034] debugfs: Directory 'loop0' with parent 'block' already present! 18:38:53 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 612.728569] FAULT_INJECTION: forcing a failure. [ 612.728569] name failslab, interval 1, probability 0, space 0, times 0 [ 612.731266] CPU: 1 PID: 6179 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 612.732736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 612.734537] Call Trace: [ 612.735114] dump_stack+0x107/0x167 [ 612.735909] should_fail.cold+0x5/0xa [ 612.736734] ? create_object.isra.0+0x3a/0xa20 [ 612.737725] should_failslab+0x5/0x20 [ 612.738576] kmem_cache_alloc+0x5b/0x360 [ 612.739465] create_object.isra.0+0x3a/0xa20 18:38:53 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 612.740417] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 612.741292] kmem_cache_alloc_trace+0x151/0x360 [ 612.741972] alloc_fs_context+0x57/0x840 [ 612.742571] path_mount+0xa72/0x20b0 [ 612.743109] ? strncpy_from_user+0x9e/0x470 [ 612.743714] ? finish_automount+0xa40/0xa40 [ 612.744318] ? getname_flags.part.0+0x1dd/0x4f0 [ 612.744977] ? _copy_from_user+0xfb/0x1b0 [ 612.745570] __x64_sys_mount+0x282/0x300 [ 612.746158] ? path_mount+0x20b0/0x20b0 [ 612.746723] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 612.747456] ? syscall_enter_from_user_mode+0x1d/0x50 [ 612.748184] do_syscall_64+0x33/0x40 [ 612.748715] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 612.749437] RIP: 0033:0x7f3dafdedb19 [ 612.749958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.752489] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 612.753560] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 612.754540] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 612.755514] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 612.756512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 612.757507] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:53 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:38:53 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:38:53 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 12) [ 612.842208] FAULT_INJECTION: forcing a failure. [ 612.842208] name failslab, interval 1, probability 0, space 0, times 0 [ 612.844655] CPU: 0 PID: 6181 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 612.846207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 612.848082] Call Trace: [ 612.848684] dump_stack+0x107/0x167 [ 612.849509] should_fail.cold+0x5/0xa [ 612.850414] ? legacy_init_fs_context+0x44/0xe0 [ 612.851542] should_failslab+0x5/0x20 [ 612.852368] kmem_cache_alloc_trace+0x55/0x360 [ 612.853550] ? lockdep_init_map_type+0x2c7/0x780 [ 612.854718] legacy_init_fs_context+0x44/0xe0 [ 612.855712] ? generic_parse_monolithic+0x1f0/0x1f0 [ 612.857004] alloc_fs_context+0x4f8/0x840 [ 612.857915] path_mount+0xa72/0x20b0 [ 612.858900] ? strncpy_from_user+0x9e/0x470 [ 612.859875] ? finish_automount+0xa40/0xa40 [ 612.861003] ? getname_flags.part.0+0x1dd/0x4f0 [ 612.862042] ? _copy_from_user+0xfb/0x1b0 [ 612.862954] __x64_sys_mount+0x282/0x300 [ 612.863833] ? path_mount+0x20b0/0x20b0 [ 612.864700] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 612.865832] ? syscall_enter_from_user_mode+0x1d/0x50 [ 612.866959] do_syscall_64+0x33/0x40 [ 612.867766] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 612.868867] RIP: 0033:0x7f3dafdedb19 [ 612.869668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 612.873624] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 612.875269] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 612.876796] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 612.878334] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 612.879868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 612.881418] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:53 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 13) [ 613.196505] FAULT_INJECTION: forcing a failure. [ 613.196505] name failslab, interval 1, probability 0, space 0, times 0 [ 613.199085] CPU: 0 PID: 6186 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 613.200566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 613.202381] Call Trace: [ 613.202957] dump_stack+0x107/0x167 [ 613.203755] should_fail.cold+0x5/0xa [ 613.204587] ? create_object.isra.0+0x3a/0xa20 [ 613.205582] should_failslab+0x5/0x20 [ 613.206424] kmem_cache_alloc+0x5b/0x360 [ 613.207324] create_object.isra.0+0x3a/0xa20 [ 613.208294] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 613.209418] kmem_cache_alloc_trace+0x151/0x360 [ 613.210451] ? lockdep_init_map_type+0x2c7/0x780 [ 613.211502] legacy_init_fs_context+0x44/0xe0 [ 613.212473] ? generic_parse_monolithic+0x1f0/0x1f0 [ 613.213568] alloc_fs_context+0x4f8/0x840 [ 613.214501] path_mount+0xa72/0x20b0 [ 613.215328] ? strncpy_from_user+0x9e/0x470 [ 613.216264] ? finish_automount+0xa40/0xa40 [ 613.217220] ? getname_flags.part.0+0x1dd/0x4f0 [ 613.218229] ? _copy_from_user+0xfb/0x1b0 [ 613.219157] __x64_sys_mount+0x282/0x300 [ 613.220035] ? path_mount+0x20b0/0x20b0 [ 613.220915] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 613.222069] ? syscall_enter_from_user_mode+0x1d/0x50 [ 613.223201] do_syscall_64+0x33/0x40 [ 613.224005] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 613.225112] RIP: 0033:0x7f3dafdedb19 [ 613.225914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.229867] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 613.231514] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 613.233042] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 613.234600] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 613.236130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.237658] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:38:53 executing program 6: unshare(0x28020600) unshare(0x20000000) unshare(0x20100) r0 = fork() tkill(r0, 0xb) r1 = fork() ptrace$setopts(0x4200, r1, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x2173, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r4}) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup2(r2, 0xffffffffffffffff) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x4e23, 0x3, @mcast1, 0x2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, &(0x7f00000000c0), 0x2, &(0x7f0000000140)) unshare(0x40000000) 18:39:08 executing program 6: unshare(0x28020600) unshare(0x20000000) unshare(0x20100) r0 = fork() tkill(r0, 0xb) r1 = fork() ptrace$setopts(0x4200, r1, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x2173, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r4}) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup2(r2, 0xffffffffffffffff) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x4e23, 0x3, @mcast1, 0x2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, &(0x7f00000000c0), 0x2, &(0x7f0000000140)) unshare(0x40000000) 18:39:08 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:08 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 627.976618] FAULT_INJECTION: forcing a failure. [ 627.976618] name failslab, interval 1, probability 0, space 0, times 0 [ 627.977904] CPU: 1 PID: 6221 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 627.978701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 627.979606] Call Trace: [ 627.979900] dump_stack+0x107/0x167 [ 627.980311] should_fail.cold+0x5/0xa [ 627.980732] ? v9fs_mount+0x5a/0x8f0 [ 627.981142] should_failslab+0x5/0x20 [ 627.981565] kmem_cache_alloc_trace+0x55/0x360 [ 627.982064] ? v9fs_write_inode+0x60/0x60 [ 627.982531] v9fs_mount+0x5a/0x8f0 [ 627.982919] ? v9fs_write_inode+0x60/0x60 [ 627.983368] legacy_get_tree+0x105/0x220 [ 627.983818] vfs_get_tree+0x8e/0x300 [ 627.984224] path_mount+0x13be/0x20b0 [ 627.984638] ? strncpy_from_user+0x9e/0x470 [ 627.985111] ? finish_automount+0xa40/0xa40 [ 627.985580] ? getname_flags.part.0+0x1dd/0x4f0 [ 627.986083] ? _copy_from_user+0xfb/0x1b0 [ 627.986545] __x64_sys_mount+0x282/0x300 [ 627.986991] ? path_mount+0x20b0/0x20b0 [ 627.987426] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 627.988000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 627.988563] do_syscall_64+0x33/0x40 [ 627.988971] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 627.989527] RIP: 0033:0x7f3dafdedb19 [ 627.989935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 627.991985] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 627.992817] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 627.993611] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 627.994412] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 627.995220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 627.996020] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:08 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 14) 18:39:08 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f00000000c0)="ed41007ab8f209756be73e000093b200dff4655fe0f4655fe0f4655f000082df68a2477ba671372ec4", 0x29, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0xfffffffffffffff7, 0x4, &(0x7f0000000440)=[{&(0x7f0000000140)="6e8ca7198ed8c5822d99d81b5eb476774b42b37a942642efbb7fe1b0382ca86330e54c80d3ca3253df5134619ec36261105bd0cef2db2f8665648e5e50be89e21bf1daedad68c7", 0x47, 0x4a}, {&(0x7f00000001c0)="e531eda63da700d4847986507f00cee07e434e814a45b4f886ee742680ce56b25a610205b4d756dabed10000000000", 0x2f, 0x8}, {&(0x7f0000000280)="4a721ffe164ec5dbba4b14012263e0cfaaa2bd26fef730aa9c1da5aaec959ca68464cf18efcd7acf6e1f9bda6d40be0d9fa9653a591e41b5ded002404232e058fe6aa90da10068490a9de146de67023dde221f10aeaa3e676b50a1eca46b2a34232519b380d0b72ca5f4673d9ae7a7e093c38beac0f2876a7d8f3140c17cba0da5289b8e1db495ae32f4efce63c3a28d454e5771a9c000200924f2faf2d5ec8234bf33d3ffaf5a7a6eae9ef860f5a3ef9c72d2979a94fb65a63ed79b2cc8fc9e185c40e79cec7c06e56cd0e06fa522ee9c68b34d7cfb0c04bbb9dfda27df1438eaa7e6f1be865759563e37cbcf6e402daa", 0xf1, 0x5}, {&(0x7f0000000380)="9a415950e399747cf26d2592f4d457ecd276bf91e1f6f688a7c051e92ea55aba8abbbb835f9da24e72e561a807f3364ea1d967f5a40b33221b1c52b7188138ef9539adafd62365fcea491f10778cd8ab38fd86252a0232b17d3a41b78e97e7b3e40554a8125daa1921408a3d47cb1a2cc560e2b2f8d4e7b9458b6683338e23250d031b66cbeccb3c2c3ddfa63cf045473a3b6885046b461eb5e55d68dafa7c", 0x9f, 0x3}], 0x2000, &(0x7f0000000540)=ANY=[@ANYBLOB="6e6f696e69745f697461626c652c6e6f62682c646f6e745f6d6561737572652c006335f2a6ce5339aa0c87736903d69e01ea6040b0b6f8df744e2b59269e9bc8886765f7fecb6b05ba4e53f978f9fe7de770ca028b68dbaf827b07fc9355bb055727a526c7a1f6b3ffbd8623834ba338738089fcda5150"]) syz_mount_image$tmpfs(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x3, 0x5, &(0x7f0000001840)=[{&(0x7f00000005c0)="45a323f75ee8f987f4042e1f1db577ef50e71aa10ac7de99508ea1ef9ab0b48bfa0e35df00e566514aaa1ce9cdff202df37c239d3957055372a2fff907770cf32c55bbde6688357875b74a6b0bcf47947b6b1d14a35651ae5e9144a9dd89a789f96be5927738c57ea624183c7caab7e4c345885ef3fe68434386a45116e73250808b799aec3a0726e5169874b4504248bca9b27ce97277857fdf9f73c4", 0x9d, 0xff}, {&(0x7f0000000680), 0x0, 0x6}, {&(0x7f00000006c0)="1aa359a86db003f314b3611a37ae3d215c3b9b8cc335c83bab4c68fcb8a76d01ef68413e39165b782677fc7021ad5b7f8379ef92d5e65221966f54b6c4cbd746c9f31c748d00433f6ea06c4b784da0ced73fa17cfb2649fc6786b66d931aca4a14883ed52f4a09e81d6f51", 0x6b, 0xe75c}, {&(0x7f0000000740)="c199bd220938ebd0fb407d492808ed7c5b71f4b9be3d1c20db7aaef516b69a3d748767fd600efd5dbb7c6614ae419f3a1d876e7c6bc71791b160afda7ab7968870ccbcd8899df3cbf258b4ac0c86e4b405a2eec49d29df229e62a7acea95407fca15819550f6278cf9f92844dc6aa1cb03d834062253ab777b26ad252901013518001d019aab8ce2bada8ffa1de7e36ea41c86f1e8869c976c057086e9785e530d6bce0e2f688a07b7086f9fe8f2079fc0252429f8b0cf8153451e76eecea16f08024779b1a67da921c4825a17f17d352603d88f4ec904ef25fee564bca4dcf2f7410adaa52799cb4718c7d6bd88edc528d564423539e99a175d9fcf8e95fdd471d18a1322509dd166e936905d2b9d848e9cf30d409639966d265f53becc0b464e0f62384ca00d0a8775f93d53d54c4a270031d1d4c1f86d4a64a60459526596990581f57070f536ae67d79e2b62d1379338aa5528173fe365a20d40a71bbcc3b4ea09400f4745c8ef9d82d59f66b9deb9221bd408f2f5209370051b71312680328b0dad7cd99d16824a6e41a0951e15d96f51cb5f2cef35c0448219f488cc75e6dce104980d9ed91417bc554a2f01bc460bd31151b50ddb1d9e3ac020736ca28cfb2d4a0e0e484436a387663298801e597b79cdf89046f16d2f162e1149b6f37f27a616f1abce845b40a13f0d2954dfe60bf46cf4dcd5d6eda354636280bdb501d422cd3feee0579c06c6e10dc8ab594d9748868444fef951ea6325233211f0a6250c48c4046211dc37197cc74ccd4f85bdafcf84c4edadd85eb59ab94ffb96468e86e73f67dcc2b85eede4da899d6e7fb674d2d6bbb35c219c8c8fbb26f493d1505ab38e13e83b24e3ec354895971734a9a3c87d2c6821439e93998b3aa42e65201f7ce2054fb19dfa85b45d106c4308a0077974936a4f763225e9f8361d8fe19547da6953f7e18d75f18ea0d83dd118d5a17f2e772f3c3bbbc3a6eb8aafcbd2c8a12308794106d545e3162ac13f6f7ac101509dba86c46ae3c8b06833cd991e767c1478847300cbfd2a3316f4b85a0f06198f9d8e423b89ccc68bb76b7d624ab41a24d47ee38dde5c433c566a207edb26fd1b7d0e6f339cbb7cb4afaf37b35b9511fa2d02ed1fbed4457a16a06738f37eb45b12c9f4870fc29cd520a43ec491909755f61d8f34c5a0347222a715236cabd1bc202802f320582e7b79d85d0e400ac99722748d1a45582de9bb58ab8330c55d9a4ac7aa56618436ab0254dbe62697e2f0688a37ef963cdbe66ed884cb2e96f2f33edb739a1543fede07c2a70549899677e96aca19b74ed1504bca6eb0c78cea70f2a9365c839ab598aa5c9cf2bc2215b1c674401fdabe90630da46968edee9ca916fe9ad477db615448514271fb886e7d293bd0090fd92469468749a6086f42dc4067ba33454e171ebce36a9e36f00bb19c3b685652462110bab828c36e1ec66cd9e25a012b191d63b0c20cac7a09700c2ac653a5d72322af4d2fcd912fd562098a73f35b4fd40256c3cc93e75f9a95a606e04d50c8b101a9ff758324d086fc8c32ccf47cd8190497f2e05d17f88f7810aa01809efae63a3c432531aba688904edb216dde05a97e501bcc4851a83c0d229fadd9878d7b00fef7cfa361a3d66666b455380f4e4bd79536696fcb5ab57e315b1a9e2cf80328d868a43127bbbe5b6d329dc6ebb643dd8c77405e400021407984dae45b4070d0fd2e4273d19b5fea93dd2f9583be6d571b9eb1d3ce890c6a7faf65af37cffc8fbe64b5944a120202e210948a473b35c21d9f63162a3b5049ac2f374848a936dcb7f7f9b58374d86f3a28cc78a41216ec0c9b6984fa8b0f41cee51be92f470e304725ef31876e7b590ec7b08abe88a0d48ae21ac9eb08abe9da8efd74bf587a08194a7b27a2ee78293235481bd71c8e3cb8147dd7ced9ebaad10a1659d3d91c565a01135f393df6aaf61f1a341c5a779ae9eb7bd88d40b782be50c8412cb24a2395f183043cd05c971feb9335e949295120a3359435f13a2c5c83448afdb083bdfa3d4b8ddc772b729f5a5e0ebe84267fa1b1c5b3713185557ee1bfb70c44e32c98e522c48e055ebc8a412e3145df771bd35209289a687d4f521e141e2cc09a54c5f4227c02647b00a85b23ffc57bcddb97810cbaddd4a87aec4cdaae41950d860ee80e13ddb726c03c556694cce35ecf861393ec71a58a8936ae69eb5262a279f9b104d172e928b857cd80f0600aa863789867602c10dcf8834997b99a97ad091b112bc1d15b4a8729424931b90d7099c5fcb51a5d93f92ac66d9d9f6d1d3d9ff6713c4145ec9f5784b3641785ecf680061c0ec0d942ae03d4bc72bf0c407c26e819b80d0763a2c10d3244239000b4a0e762846a64d665039dff38e3fd9a4ad25095265a65bbeec65e2978c16317b41ab0db9b62866bf03c1da0dafc09a4be63c2c6e2715afac2d431a04f9ebcb5c33348652d746cca13805b381ab5bec1df7612a3f66acb70cee404a856246d77982f8a2f63eed6b8e2ad5cc3f94ff8c8a4a6433cb233769c3016ad8912c664857399fd4f464f14fff79f441739c1d43cb45bfdc8876487d18f1d666644edaac0b9be17ab84d25b7e53a868bd7cb7bf5c9a67c82e2db2722f13be0917d4dff5cf59cba97e2756fd22a5f6b7618b91daf0ea2790bfb1388e3603335292e541b184094a3b60f637cc552d6e3da09d945f941c3ea5f54e962e559cbcca85473048ac15070802e3a415b34c7d4f0ba7037c0b09ceeb63892759dcff9738e61b10ff8cd603e7cd6df4345166bfd175824b9a806e0f1cc43ad4a07c16e65b37d5f756803fa84e3e9f70b1117d8025f9e17c5007d85824cc6a6a44c961326bef6d03ffe812001948382b5c059d2b68483354d4f035926dd6bc3f65022a8208bad2b7d41f47455709ef2464fbf1aff86d411e0b47b20c7f2013d55472bc82e073487fa14c5887ad06f021cc0521e13b7b8470ae44147eb23a278737d67ffc038bbd42338d3731e9d4e80b871baaff0ae4c51674025667b4b892050d23e2e14c1df5587439bf703b24ab22dd18bf3ae2bc7e38a454fd03fb3f316820f50d853bbd91fd9e07f795d70d567ba60a4e1f06623fe2c7f5b5301834c4b400603b76c0983d6110eda4cecaa07de7bb5206c604d685892d3d2ccd75230eb3e0d4a9eb73368c08379100742b2b8414174e7feba3cdf7e137d3a627c2064ba7d353d28ab3691d727c05a7c0bba936ce40a9ccff32a4d36a9e4aba629640a39ee74accfb54e009966b890be66d083942ab553e4822e2b7db5c93820a0c3a7a4a1e26d0234f470bfed4ce7afa71ac957f9f68f318bafb29064081c26a2aa471bc929be92589929ff2e746739fad1528fe3f1a84dbc0fcdab60bd7347a6d9c085ea7b73158891dab299be89c53b6fa07a60505c327f885dfca942994bc39c38932f46d3626a026a928f85d1215ae80128de6749d7643b8755159386fbfc305bfc9abb9c85836da4134b221c05eae408bc1d6a557f2d74b2a1851fa15348e7cd90c1dbf865958ea18370d3787672d6b5bdb080e43e68b10caeb9c53d0a66a7ac1b369b30a4a70eafd3f8d4cdaae2aa5ab615b20d122965a6c9a7d86d3932345d190ab404105e54db5d2f6744da2300334d7ef4d0a9d71d62ba417da9828aaa8dcd9bfc13c997ff7d90e5b9b3cd049acab2b5c9ba7f51c31c45c05ac279fc6db16d949019a5f0727ff28ef5281dbb362cfcdc12fc6516dbce674e31dd8e1756a558e01699c8c9692b4afd5521d8b835dc06c5a996629c5ca3cb7704df41b74cacf5c19c287a49a41058016edb042c32ae45538154e72a12596576c0cdcc450d6074a636670a10100faa9de916a5994ab1047e455b9d33cfcf1b63708897417414699e4b987a310cda39f51106b5059399fb725ddf96816d622bc8b0b3a83a75fd37bd116947ea41c0d69f394e9a8b3c0f668bdb7d211acafccc534437df3e3ee5aabc1969691bbd3bb7d8721559d33a02c8ce2b20646db6bd6e2102342c2c53fb615ac98397dd3fdde6335174ec4532ebcf3283eacdf6776d811e101c2fed795547f7f2f265a5e3aa34061ac6de348fdaa57831600cd04da929d72aab5171b5601b6188e2b1a31775352fdee0346e9afad00e33fb1be6e4d6d1042585d2ac6fda7df932abcb671d1c81086eb4866c809496fc40cda42a0c3484501d857dbe635e677f1213bd70440177e9ee0ac8ada79d54665e842309ddcb70581120bd7f59c0ab8fe16ad42f0e8268c9ed45b3f6f1ee84c9ea8e08029f09738c8e6cda514e26c93245b039a8fbfff1a1a9e21e904baecbaf06f8cd737196e67a26354acad738aa121861009eceee47ee6f5a22c336eaf315118896edce5eb0c789c56e3190dad4a4b690c5e30f3a3e41a988a6f2d201bbf24ef7fc48d9ee97bb706bdb93f14e226a733891dc965b6665dbcb0eda483f6af9f5051bcb5cad521c7343f9028198d5597c51be61bb9ad8912c04ce61b502ef004222b9cf15d1b6a2c9617adeec6896cc220d931b6485bc9ac7e29a6d67228037a3b1fd9e7352dcdbdad8b0e42dfe393705f6ce1699fec379783b40b3eb602a8a7b772a994ebb5fb9b77c121f53007d6b00174d8c3528b8c589e9e8f34b60965516540730d2d9f96d993efcf0a3f7a010e264c7bc12e71ae25782890cff838a4a872cea5bf25176b27f76371c00c04502061108dd831c34cf80cbce858bdba6ef6db594d05dda41c866f6ab96d7a0794ead8bb9a3b80853c1de3edaf1cb8c4d22845d2223553b02eef551c31ce019cedd5b86d23e19b07dd0fa0ae717a357c9fde794435cd962beaa9dbaf93dbfe2eb74636e10d8f70485c421cd2733154a670079d0bf751f29cbeac54821225d265da893d9fff9acfc051827b5b6adcabbab1ab6eff41a88e593dcb6e7d013c2bf1a732a0957d148b768f7a2a91d30cec3666a9712c70bcfb3c5ee14d9bd0613f6d1b36d3d1a420e73db3e99ebdabd1a230ea1662c0e3263162cee5b6c9658ddc959d8f0d1cb245d53d268221f9b8d954af3f0ee968ed3f097373877d540fc5b67029c5e34ad3e6d7a4b54cd3813dea95536a386292ae6a8f37445f04e3b2846276b985a41d4a352b6942f0e2afdad755c6a53ccb58e48ad2b94d22ea890191884ce92e2cdf61e2346ecacd103e20ebbbbb8d5c628fa53d4f02a940644c5be404d69e26ee833023b21511e04b07e2028a2f80cfd0a4bef27b7dc0f999ffec81de9ff1da13fc3ceaf4d6b65636c3b032419189c908022d9e844b775740359b7fbed261e4348bc9a65ef5b7f97b5c218432da90f8845d4a48e9ac3dc4babab9ed9a42ce2bc45747296a844f1e2d33b6208f30723d626fc2023c526a4a014cac715a0ff20bef93772b81fa0e4d0e5d9fd7b6e010d8afe703e772a3fad30d303b97bce7209e7acad18c2b400bf63b8892c6c85f17e0388ddfbe9bd23f2c0df5776ef16c036cac3b5500f61c90e2fe9418688ec8c71ec5182a78d5c243d6e0b2b91a5257d5cb89461912fc80dec64b7b59fac92df55cfdd19f87f9a095c13082ff2cf00bdbee6def68d6009cfbb5fd4ca4199f73cd7a803b880dc8ce9c814a04755d091e1a588a6adf3f78b79aa4e6481ba546b0c737ac36328f9b23c50b726792b1cf2e6742372be4c9a5615b1806b1afd0fc5eb0db2869595fd1499e92a80f3720b3e921c6da91ecbb9145ef5a962deb0e940a496b37bba939c52831a3a13f5888866ab9b0dd610a92c28ed5e6a56c29582b0bba61", 0x1000, 0x81}, {&(0x7f0000001740)="0f99cac85e13b16e2dfb8f5e011e2565e13c28ce229091cbeb87cdc98a2258910cead233e495eab2ddadc6fc4ebcdee9b8c6199edc82662c90618663c50146ab6421f5fe2b57d53a775d00b5fb4565cf988b0ec99266be34768623856f075c1a5b410f6af3f3d8a7d0b7772baeec69436e6c947f5a443e801b5af70e44fc0099b0d1078f58f87298cb71b4770bbf7e3125dcca23af5be6b16ff5b2f8c5da852ee8daa4f12fdff3170d1867fd66f0d64993534d6c5d8ac9d2dc6934cc4fa2bf646296b3a79b849f5e598d0b", 0xcb, 0x6}], 0x2000000, &(0x7f00000018c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x32]}}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 18:39:08 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "46dacd8396fe92"}) r4 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) mq_timedsend(r4, &(0x7f0000001200), 0x0, 0x3, &(0x7f00000012c0)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {r8}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000000100)={r8, 0x1000}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000200)={r3, r8, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005ba80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f000005bc80)={{0x0, 0x9, 0x7ff, 0x10000, 0x1ff, 0x0, 0x3ff, 0x4, 0x3, 0x1f, 0x13, 0x1f, 0x6, 0x4, 0x8000}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f000005bd40)={{0x0, 0x101, 0x101, 0x0, 0x7fffffff, 0x4, 0xfffffffffffffc01, 0x2, 0xffffffe0, 0x8e3d, 0x1, 0x1ff, 0xff, 0x1, 0x8}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005cd40)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8, r11}, {r12}, {}, {r13}], 0x7, "23a3bcfab02789"}) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x34, r1, 0xb0b, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x1c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0x34}}, 0x0) 18:39:08 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:08 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 15) [ 628.105564] FAULT_INJECTION: forcing a failure. [ 628.105564] name failslab, interval 1, probability 0, space 0, times 0 [ 628.106860] CPU: 1 PID: 6243 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 628.107607] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 628.108515] Call Trace: [ 628.108813] dump_stack+0x107/0x167 [ 628.109224] should_fail.cold+0x5/0xa [ 628.109642] ? create_object.isra.0+0x3a/0xa20 [ 628.110145] should_failslab+0x5/0x20 [ 628.110567] kmem_cache_alloc+0x5b/0x360 [ 628.111007] ? cred_has_capability.isra.0+0x152/0x2b0 [ 628.111571] create_object.isra.0+0x3a/0xa20 [ 628.112048] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 628.112606] kmem_cache_alloc_trace+0x151/0x360 [ 628.113118] ? v9fs_write_inode+0x60/0x60 [ 628.113569] v9fs_mount+0x5a/0x8f0 [ 628.113958] ? v9fs_write_inode+0x60/0x60 [ 628.114424] legacy_get_tree+0x105/0x220 [ 628.114878] vfs_get_tree+0x8e/0x300 [ 628.115286] path_mount+0x13be/0x20b0 [ 628.115702] ? strncpy_from_user+0x9e/0x470 [ 628.116174] ? finish_automount+0xa40/0xa40 [ 628.116641] ? getname_flags.part.0+0x1dd/0x4f0 [ 628.117148] ? _copy_from_user+0xfb/0x1b0 [ 628.117614] __x64_sys_mount+0x282/0x300 [ 628.118058] ? path_mount+0x20b0/0x20b0 [ 628.118496] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 628.119072] ? syscall_enter_from_user_mode+0x1d/0x50 [ 628.119632] do_syscall_64+0x33/0x40 [ 628.120044] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 628.120595] RIP: 0033:0x7f3dafdedb19 [ 628.121009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 628.122993] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 628.123823] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 628.124588] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 628.125350] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 628.126123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 628.126903] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:08 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:08 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 16) [ 628.364932] debugfs: Directory 'loop0' with parent 'block' already present! [ 628.424812] FAULT_INJECTION: forcing a failure. [ 628.424812] name failslab, interval 1, probability 0, space 0, times 0 [ 628.426097] CPU: 1 PID: 6263 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 628.426862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 628.427758] Call Trace: [ 628.428059] dump_stack+0x107/0x167 [ 628.428462] should_fail.cold+0x5/0xa [ 628.428889] should_failslab+0x5/0x20 [ 628.429313] __kmalloc_track_caller+0x79/0x3c0 [ 628.429823] ? v9fs_session_init+0xa7/0x16a0 [ 628.430308] ? kernel_text_address+0xf2/0x120 [ 628.430814] kstrdup+0x36/0x70 [ 628.431183] v9fs_session_init+0xa7/0x16a0 [ 628.431652] ? find_held_lock+0x2c/0x110 [ 628.432111] ? kmem_cache_alloc_trace+0x151/0x360 [ 628.432648] ? v9fs_show_options+0x690/0x690 [ 628.433159] ? kasan_unpoison_shadow+0x33/0x50 [ 628.433682] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 628.434276] v9fs_mount+0x79/0x8f0 [ 628.434677] ? v9fs_write_inode+0x60/0x60 [ 628.435154] legacy_get_tree+0x105/0x220 [ 628.435630] vfs_get_tree+0x8e/0x300 [ 628.436055] path_mount+0x13be/0x20b0 [ 628.436498] ? strncpy_from_user+0x9e/0x470 [ 628.436987] ? finish_automount+0xa40/0xa40 [ 628.437499] ? getname_flags.part.0+0x1dd/0x4f0 [ 628.438028] ? _copy_from_user+0xfb/0x1b0 [ 628.438515] __x64_sys_mount+0x282/0x300 [ 628.438993] ? path_mount+0x20b0/0x20b0 [ 628.439445] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 628.440054] ? syscall_enter_from_user_mode+0x1d/0x50 [ 628.440662] do_syscall_64+0x33/0x40 [ 628.441088] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 628.441682] RIP: 0033:0x7f3dafdedb19 [ 628.442115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 628.444253] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 628.445141] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 628.445976] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 628.446799] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 628.447627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 628.448464] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 628.463095] EXT4-fs (loop3): Unrecognized mount option "nŒ§ŽØÅ‚-™Ø^´vwKB³z”&Bï»á°8" or missing value [ 628.485553] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 628.486646] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/47/file0 supports timestamps until 2038 (0x7fffffff) [ 628.765189] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 628.784232] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/42/file0 supports timestamps until 2038 (0x7fffffff) 18:39:21 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:21 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:21 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:21 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 641.297974] FAULT_INJECTION: forcing a failure. [ 641.297974] name failslab, interval 1, probability 0, space 0, times 0 [ 641.300769] CPU: 1 PID: 6285 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 641.302426] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 641.304422] Call Trace: [ 641.305070] dump_stack+0x107/0x167 [ 641.305952] should_fail.cold+0x5/0xa [ 641.306896] ? create_object.isra.0+0x3a/0xa20 [ 641.308000] should_failslab+0x5/0x20 [ 641.308916] kmem_cache_alloc+0x5b/0x360 [ 641.309904] create_object.isra.0+0x3a/0xa20 [ 641.310983] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 641.312209] __kmalloc_track_caller+0x177/0x3c0 [ 641.313336] ? v9fs_session_init+0xa7/0x16a0 [ 641.314406] ? kernel_text_address+0xf2/0x120 [ 641.315502] kstrdup+0x36/0x70 [ 641.316309] v9fs_session_init+0xa7/0x16a0 [ 641.317331] ? find_held_lock+0x2c/0x110 [ 641.318314] ? kmem_cache_alloc_trace+0x151/0x360 [ 641.319479] ? v9fs_show_options+0x690/0x690 [ 641.320562] ? kasan_unpoison_shadow+0x33/0x50 [ 641.321665] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 641.322911] v9fs_mount+0x79/0x8f0 18:39:21 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) 18:39:21 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 17) 18:39:21 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:21 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 641.323772] ? v9fs_write_inode+0x60/0x60 [ 641.324840] legacy_get_tree+0x105/0x220 [ 641.325822] vfs_get_tree+0x8e/0x300 [ 641.326735] path_mount+0x13be/0x20b0 [ 641.327656] ? strncpy_from_user+0x9e/0x470 [ 641.328696] ? finish_automount+0xa40/0xa40 [ 641.329958] ? getname_flags.part.0+0x1dd/0x4f0 [ 641.331401] ? _copy_from_user+0xfb/0x1b0 [ 641.332701] __x64_sys_mount+0x282/0x300 [ 641.333948] ? path_mount+0x20b0/0x20b0 [ 641.335188] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 641.336555] ? syscall_enter_from_user_mode+0x1d/0x50 [ 641.337752] do_syscall_64+0x33/0x40 [ 641.338547] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 641.339620] RIP: 0033:0x7f3dafdedb19 [ 641.340397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 641.344214] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 641.345775] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 641.347291] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 641.348760] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 641.350244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 641.351763] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:22 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:22 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 18) [ 641.506673] FAULT_INJECTION: forcing a failure. [ 641.506673] name failslab, interval 1, probability 0, space 0, times 0 [ 641.509204] CPU: 1 PID: 6297 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 641.510659] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 641.512439] Call Trace: [ 641.512998] dump_stack+0x107/0x167 [ 641.513770] should_fail.cold+0x5/0xa [ 641.514604] should_failslab+0x5/0x20 [ 641.515414] __kmalloc_track_caller+0x79/0x3c0 [ 641.516395] ? v9fs_session_init+0xe9/0x16a0 [ 641.517320] ? kernel_text_address+0xf2/0x120 [ 641.518280] kstrdup+0x36/0x70 [ 641.518963] v9fs_session_init+0xe9/0x16a0 [ 641.519856] ? find_held_lock+0x2c/0x110 [ 641.520738] ? kmem_cache_alloc_trace+0x151/0x360 [ 641.521751] ? v9fs_show_options+0x690/0x690 [ 641.522718] ? kasan_unpoison_shadow+0x33/0x50 [ 641.523683] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 641.524770] v9fs_mount+0x79/0x8f0 [ 641.525531] ? v9fs_write_inode+0x60/0x60 [ 641.526424] legacy_get_tree+0x105/0x220 [ 641.527293] vfs_get_tree+0x8e/0x300 [ 641.528079] path_mount+0x13be/0x20b0 [ 641.528921] ? strncpy_from_user+0x9e/0x470 [ 641.529844] ? finish_automount+0xa40/0xa40 [ 641.530772] ? getname_flags.part.0+0x1dd/0x4f0 [ 641.531766] ? _copy_from_user+0xfb/0x1b0 [ 641.532674] __x64_sys_mount+0x282/0x300 [ 641.533540] ? path_mount+0x20b0/0x20b0 [ 641.534577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 641.535964] ? syscall_enter_from_user_mode+0x1d/0x50 [ 641.537331] do_syscall_64+0x33/0x40 [ 641.538310] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 641.539660] RIP: 0033:0x7f3dafdedb19 [ 641.540627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 641.544813] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 641.546464] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 641.547953] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 641.549460] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 641.550998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 641.552516] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:22 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:22 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 19) [ 641.666375] FAULT_INJECTION: forcing a failure. [ 641.666375] name failslab, interval 1, probability 0, space 0, times 0 [ 641.669051] CPU: 1 PID: 6307 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 641.670545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 641.672321] Call Trace: [ 641.672882] dump_stack+0x107/0x167 [ 641.673670] should_fail.cold+0x5/0xa [ 641.674494] ? create_object.isra.0+0x3a/0xa20 [ 641.675478] ? create_object.isra.0+0x3a/0xa20 [ 641.676460] should_failslab+0x5/0x20 [ 641.677273] kmem_cache_alloc+0x5b/0x360 [ 641.678144] create_object.isra.0+0x3a/0xa20 [ 641.679078] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 641.680190] __kmalloc_track_caller+0x177/0x3c0 [ 641.681185] ? v9fs_session_init+0xe9/0x16a0 [ 641.682147] kstrdup+0x36/0x70 [ 641.682849] v9fs_session_init+0xe9/0x16a0 [ 641.683769] ? find_held_lock+0x2c/0x110 [ 641.684671] ? kmem_cache_alloc_trace+0x151/0x360 [ 641.685711] ? v9fs_show_options+0x690/0x690 [ 641.686705] ? kasan_unpoison_shadow+0x33/0x50 [ 641.687689] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 641.688801] v9fs_mount+0x79/0x8f0 [ 641.689585] ? v9fs_write_inode+0x60/0x60 [ 641.690498] legacy_get_tree+0x105/0x220 [ 641.691377] vfs_get_tree+0x8e/0x300 [ 641.692189] path_mount+0x13be/0x20b0 [ 641.693008] ? strncpy_from_user+0x9e/0x470 [ 641.693937] ? finish_automount+0xa40/0xa40 [ 641.694881] ? getname_flags.part.0+0x1dd/0x4f0 [ 641.695892] ? _copy_from_user+0xfb/0x1b0 [ 641.696980] __x64_sys_mount+0x282/0x300 [ 641.697923] ? path_mount+0x20b0/0x20b0 [ 641.698810] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 641.699917] ? syscall_enter_from_user_mode+0x1d/0x50 [ 641.701027] do_syscall_64+0x33/0x40 [ 641.701865] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 641.702944] RIP: 0033:0x7f3dafdedb19 [ 641.703734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 641.707605] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 641.709263] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 641.710805] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 641.712299] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 641.713840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 641.715357] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:22 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 20) [ 641.781812] FAULT_INJECTION: forcing a failure. [ 641.781812] name failslab, interval 1, probability 0, space 0, times 0 [ 641.784372] CPU: 1 PID: 6314 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 641.785815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 641.787690] Call Trace: [ 641.788339] dump_stack+0x107/0x167 [ 641.789231] should_fail.cold+0x5/0xa [ 641.790162] ? p9_client_create+0xaf/0x1090 [ 641.791225] should_failslab+0x5/0x20 [ 641.792146] kmem_cache_alloc_trace+0x55/0x360 [ 641.793247] ? find_held_lock+0x2c/0x110 [ 641.794240] p9_client_create+0xaf/0x1090 [ 641.795250] ? lock_downgrade+0x6d0/0x6d0 [ 641.796261] ? p9_client_flush+0x430/0x430 [ 641.797322] ? lockdep_init_map_type+0x2c7/0x780 [ 641.798479] ? rcu_read_lock_sched_held+0x3e/0x80 [ 641.799653] ? __raw_spin_lock_init+0x36/0x110 [ 641.800768] v9fs_session_init+0x1dd/0x16a0 [ 641.801828] ? kmem_cache_alloc_trace+0x151/0x360 [ 641.803002] ? v9fs_show_options+0x690/0x690 [ 641.804090] ? kasan_unpoison_shadow+0x33/0x50 [ 641.805193] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 641.806430] v9fs_mount+0x79/0x8f0 [ 641.807292] ? v9fs_write_inode+0x60/0x60 [ 641.808297] legacy_get_tree+0x105/0x220 [ 641.809287] vfs_get_tree+0x8e/0x300 [ 641.810192] path_mount+0x13be/0x20b0 [ 641.811145] ? strncpy_from_user+0x9e/0x470 [ 641.812191] ? finish_automount+0xa40/0xa40 [ 641.813244] ? getname_flags.part.0+0x1dd/0x4f0 [ 641.814373] ? _copy_from_user+0xfb/0x1b0 [ 641.815401] __x64_sys_mount+0x282/0x300 [ 641.816388] ? path_mount+0x20b0/0x20b0 [ 641.817354] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 641.818621] ? syscall_enter_from_user_mode+0x1d/0x50 [ 641.819865] do_syscall_64+0x33/0x40 [ 641.820757] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 641.821977] RIP: 0033:0x7f3dafdedb19 [ 641.822875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 641.827264] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 641.829080] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 641.830810] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 641.832507] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 641.834199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 641.835908] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 642.247471] debugfs: Directory 'loop0' with parent 'block' already present! [ 654.794410] FAULT_INJECTION: forcing a failure. [ 654.794410] name failslab, interval 1, probability 0, space 0, times 0 [ 654.795711] CPU: 1 PID: 6327 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 654.796439] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 654.797328] Call Trace: [ 654.797624] dump_stack+0x107/0x167 [ 654.798028] should_fail.cold+0x5/0xa [ 654.798440] ? create_object.isra.0+0x3a/0xa20 [ 654.798947] should_failslab+0x5/0x20 [ 654.799375] kmem_cache_alloc+0x5b/0x360 [ 654.799813] ? kernel_text_address+0xf2/0x120 [ 654.800298] create_object.isra.0+0x3a/0xa20 [ 654.800783] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 654.801334] kmem_cache_alloc_trace+0x151/0x360 [ 654.801843] ? find_held_lock+0x2c/0x110 [ 654.802291] p9_client_create+0xaf/0x1090 [ 654.802752] ? lock_downgrade+0x6d0/0x6d0 [ 654.803210] ? p9_client_flush+0x430/0x430 [ 654.803681] ? lockdep_init_map_type+0x2c7/0x780 [ 654.804188] ? rcu_read_lock_sched_held+0x3e/0x80 [ 654.804740] ? __raw_spin_lock_init+0x36/0x110 [ 654.805238] v9fs_session_init+0x1dd/0x16a0 [ 654.805714] ? kmem_cache_alloc_trace+0x151/0x360 [ 654.806244] ? v9fs_show_options+0x690/0x690 [ 654.806746] ? kasan_unpoison_shadow+0x33/0x50 [ 654.807244] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 654.807793] v9fs_mount+0x79/0x8f0 [ 654.808179] ? v9fs_write_inode+0x60/0x60 [ 654.808628] legacy_get_tree+0x105/0x220 [ 654.809069] vfs_get_tree+0x8e/0x300 [ 654.809479] path_mount+0x13be/0x20b0 [ 654.809899] ? strncpy_from_user+0x9e/0x470 [ 654.810367] ? finish_automount+0xa40/0xa40 [ 654.810849] ? getname_flags.part.0+0x1dd/0x4f0 [ 654.811351] ? _copy_from_user+0xfb/0x1b0 [ 654.811808] __x64_sys_mount+0x282/0x300 [ 654.812247] ? path_mount+0x20b0/0x20b0 [ 654.812679] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 654.813244] ? syscall_enter_from_user_mode+0x1d/0x50 [ 654.813804] do_syscall_64+0x33/0x40 [ 654.814206] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 654.814771] RIP: 0033:0x7f3dafdedb19 [ 654.815175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 654.817137] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 654.817955] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 654.818740] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 654.819506] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 654.820271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 654.821053] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 654.906939] FAULT_INJECTION: forcing a failure. 18:39:35 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 21) 18:39:35 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:35 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:39:35 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:35 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) [ 654.906939] name failslab, interval 1, probability 0, space 0, times 0 perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) 18:39:35 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 654.908367] CPU: 1 PID: 6348 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 654.909250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 654.910152] Call Trace: [ 654.910449] dump_stack+0x107/0x167 [ 654.910853] should_fail.cold+0x5/0xa [ 654.911270] ? create_object.isra.0+0x3a/0xa20 [ 654.911770] should_failslab+0x5/0x20 [ 654.912178] kmem_cache_alloc+0x5b/0x360 [ 654.912614] ? kernel_text_address+0xf2/0x120 [ 654.913113] create_object.isra.0+0x3a/0xa20 [ 654.913585] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 654.914135] kmem_cache_alloc_trace+0x151/0x360 [ 654.914659] p9_client_create+0xaf/0x1090 [ 654.915104] ? lock_downgrade+0x6d0/0x6d0 [ 654.915557] ? p9_client_flush+0x430/0x430 [ 654.916024] ? lockdep_init_map_type+0x2c7/0x780 [ 654.916531] ? rcu_read_lock_sched_held+0x3e/0x80 [ 654.917063] ? __raw_spin_lock_init+0x36/0x110 [ 654.917573] v9fs_session_init+0x1dd/0x16a0 [ 654.918052] ? kmem_cache_alloc_trace+0x151/0x360 [ 654.918585] ? v9fs_show_options+0x690/0x690 18:39:35 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 22) [ 654.919080] ? kasan_unpoison_shadow+0x33/0x50 [ 654.919786] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 654.920371] v9fs_mount+0x79/0x8f0 [ 654.920755] ? v9fs_write_inode+0x60/0x60 [ 654.921210] legacy_get_tree+0x105/0x220 [ 654.921653] vfs_get_tree+0x8e/0x300 [ 654.922051] path_mount+0x13be/0x20b0 [ 654.922466] ? strncpy_from_user+0x9e/0x470 [ 654.922937] ? finish_automount+0xa40/0xa40 [ 654.923399] ? getname_flags.part.0+0x1dd/0x4f0 [ 654.923901] ? _copy_from_user+0xfb/0x1b0 [ 654.924359] __x64_sys_mount+0x282/0x300 [ 654.924806] ? path_mount+0x20b0/0x20b0 [ 654.925240] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 654.925802] ? syscall_enter_from_user_mode+0x1d/0x50 [ 654.926365] do_syscall_64+0x33/0x40 [ 654.926783] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 654.927348] RIP: 0033:0x7f3dafdedb19 [ 654.927745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 654.929724] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 654.930545] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 654.931311] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 654.932075] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 654.932850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 654.933618] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:35 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 23) [ 655.270331] debugfs: Directory 'loop0' with parent 'block' already present! 18:39:35 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 655.359497] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 655.361639] ext4 filesystem being mounted at /syzkaller-testdir037038886/syzkaller.DKOSF4/49/file0 supports timestamps until 2038 (0x7fffffff) 18:39:35 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) [ 655.498675] debugfs: Directory 'loop0' with parent 'block' already present! [ 655.591054] FAULT_INJECTION: forcing a failure. [ 655.591054] name failslab, interval 1, probability 0, space 0, times 0 [ 655.592374] CPU: 1 PID: 6382 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 655.593117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 655.594023] Call Trace: [ 655.594317] dump_stack+0x107/0x167 [ 655.594725] should_fail.cold+0x5/0xa [ 655.595148] ? create_object.isra.0+0x3a/0xa20 [ 655.595653] should_failslab+0x5/0x20 [ 655.596073] kmem_cache_alloc+0x5b/0x360 [ 655.596524] ? lock_downgrade+0x6d0/0x6d0 [ 655.596981] create_object.isra.0+0x3a/0xa20 [ 655.597458] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 655.598019] __kmalloc_track_caller+0x177/0x3c0 [ 655.598546] ? p9_client_create+0x41d/0x1090 [ 655.599052] kstrdup+0x36/0x70 [ 655.599407] p9_client_create+0x41d/0x1090 [ 655.599868] ? lock_downgrade+0x6d0/0x6d0 [ 655.600327] ? p9_client_flush+0x430/0x430 [ 655.600788] ? lockdep_init_map_type+0x2c7/0x780 [ 655.601315] ? rcu_read_lock_sched_held+0x3e/0x80 [ 655.601860] ? __raw_spin_lock_init+0x36/0x110 [ 655.602381] v9fs_session_init+0x1dd/0x16a0 [ 655.602880] ? kmem_cache_alloc_trace+0x151/0x360 [ 655.603337] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 655.603422] ? v9fs_show_options+0x690/0x690 [ 655.603446] ? kasan_unpoison_shadow+0x33/0x50 [ 655.605489] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/49/file0 supports timestamps until 2038 (0x7fffffff) [ 655.605654] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 655.608560] v9fs_mount+0x79/0x8f0 [ 655.608966] ? v9fs_write_inode+0x60/0x60 [ 655.609428] legacy_get_tree+0x105/0x220 [ 655.609888] vfs_get_tree+0x8e/0x300 [ 655.610301] path_mount+0x13be/0x20b0 [ 655.610730] ? strncpy_from_user+0x9e/0x470 [ 655.611229] ? finish_automount+0xa40/0xa40 [ 655.611722] ? getname_flags.part.0+0x1dd/0x4f0 [ 655.612231] ? _copy_from_user+0xfb/0x1b0 [ 655.612602] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 655.612698] __x64_sys_mount+0x282/0x300 [ 655.612710] ? path_mount+0x20b0/0x20b0 [ 655.612723] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 655.612747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 655.614769] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/44/file0 supports timestamps until 2038 (0x7fffffff) [ 655.614864] do_syscall_64+0x33/0x40 [ 655.618621] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 655.619192] RIP: 0033:0x7f3dafdedb19 [ 655.619607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 655.621345] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 655.621633] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 655.624125] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 655.624801] ext4 filesystem being mounted at /syzkaller-testdir550774415/syzkaller.6Wxt4r/51/file0 supports timestamps until 2038 (0x7fffffff) [ 655.624910] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 655.624925] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 655.629105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 655.629898] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:36 executing program 3: unshare(0x28020600) unshare(0x20000000) unshare(0x20100) r0 = fork() tkill(r0, 0xb) r1 = fork() ptrace$setopts(0x4200, r1, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x2173, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r4}) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup2(r2, 0xffffffffffffffff) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x4e23, 0x3, @mcast1, 0x2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, &(0x7f00000000c0), 0x2, &(0x7f0000000140)) unshare(0x40000000) 18:39:36 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:36 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 24) [ 655.771070] FAULT_INJECTION: forcing a failure. [ 655.771070] name failslab, interval 1, probability 0, space 0, times 0 [ 655.772366] CPU: 1 PID: 6393 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 655.773105] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 655.774018] Call Trace: [ 655.774310] dump_stack+0x107/0x167 [ 655.774718] should_fail.cold+0x5/0xa [ 655.775142] should_failslab+0x5/0x20 [ 655.775563] __kmalloc_track_caller+0x79/0x3c0 [ 655.776053] ? p9_client_create+0x51e/0x1090 [ 655.776537] kmemdup_nul+0x2d/0xa0 [ 655.776931] p9_client_create+0x51e/0x1090 [ 655.777401] ? p9_client_flush+0x430/0x430 [ 655.777876] ? lockdep_init_map_type+0x2c7/0x780 [ 655.778394] ? rcu_read_lock_sched_held+0x3e/0x80 [ 655.778940] ? __raw_spin_lock_init+0x36/0x110 [ 655.779445] v9fs_session_init+0x1dd/0x16a0 [ 655.779928] ? kmem_cache_alloc_trace+0x151/0x360 [ 655.780452] ? v9fs_show_options+0x690/0x690 [ 655.780956] ? kasan_unpoison_shadow+0x33/0x50 [ 655.781456] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 655.782023] v9fs_mount+0x79/0x8f0 [ 655.782412] ? v9fs_write_inode+0x60/0x60 [ 655.782880] legacy_get_tree+0x105/0x220 [ 655.783335] vfs_get_tree+0x8e/0x300 [ 655.783742] path_mount+0x13be/0x20b0 [ 655.784162] ? strncpy_from_user+0x9e/0x470 [ 655.784636] ? finish_automount+0xa40/0xa40 [ 655.785104] ? getname_flags.part.0+0x1dd/0x4f0 [ 655.785613] ? _copy_from_user+0xfb/0x1b0 [ 655.786068] __x64_sys_mount+0x282/0x300 [ 655.786517] ? path_mount+0x20b0/0x20b0 [ 655.786957] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 655.787534] ? syscall_enter_from_user_mode+0x1d/0x50 [ 655.788108] do_syscall_64+0x33/0x40 [ 655.788521] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 655.789077] RIP: 0033:0x7f3dafdedb19 [ 655.789488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 655.791493] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 655.792337] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 655.793123] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 655.793903] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 655.794695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 655.795473] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:36 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:50 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 25) 18:39:50 executing program 3: unshare(0x28020600) unshare(0x20000000) unshare(0x20100) r0 = fork() tkill(r0, 0xb) r1 = fork() ptrace$setopts(0x4200, r1, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x2173, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r4}) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup2(r2, 0xffffffffffffffff) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x4e23, 0x3, @mcast1, 0x2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, &(0x7f00000000c0), 0x2, &(0x7f0000000140)) unshare(0x40000000) 18:39:50 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:50 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) [ 670.200900] FAULT_INJECTION: forcing a failure. [ 670.200900] name failslab, interval 1, probability 0, space 0, times 0 [ 670.202219] CPU: 1 PID: 6419 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 670.202976] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 670.203864] Call Trace: [ 670.204155] dump_stack+0x107/0x167 [ 670.204557] should_fail.cold+0x5/0xa [ 670.204971] ? create_object.isra.0+0x3a/0xa20 18:39:50 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:50 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:50 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:39:50 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 670.205545] should_failslab+0x5/0x20 [ 670.206023] kmem_cache_alloc+0x5b/0x360 [ 670.206461] create_object.isra.0+0x3a/0xa20 [ 670.206947] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 670.207499] __kmalloc_track_caller+0x177/0x3c0 [ 670.207999] ? p9_client_create+0x51e/0x1090 [ 670.208476] kmemdup_nul+0x2d/0xa0 [ 670.208862] p9_client_create+0x51e/0x1090 [ 670.209324] ? p9_client_flush+0x430/0x430 [ 670.209789] ? lockdep_init_map_type+0x2c7/0x780 [ 670.210299] ? rcu_read_lock_sched_held+0x3e/0x80 [ 670.210831] ? __raw_spin_lock_init+0x36/0x110 [ 670.211328] v9fs_session_init+0x1dd/0x16a0 [ 670.211801] ? kmem_cache_alloc_trace+0x151/0x360 [ 670.212318] ? v9fs_show_options+0x690/0x690 [ 670.212803] ? kasan_unpoison_shadow+0x33/0x50 [ 670.213294] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 670.213842] v9fs_mount+0x79/0x8f0 [ 670.214229] ? v9fs_write_inode+0x60/0x60 [ 670.214678] legacy_get_tree+0x105/0x220 [ 670.215134] vfs_get_tree+0x8e/0x300 [ 670.215541] path_mount+0x13be/0x20b0 [ 670.215954] ? strncpy_from_user+0x9e/0x470 [ 670.216427] ? finish_automount+0xa40/0xa40 [ 670.216897] ? getname_flags.part.0+0x1dd/0x4f0 [ 670.217401] ? _copy_from_user+0xfb/0x1b0 [ 670.217862] __x64_sys_mount+0x282/0x300 [ 670.218310] ? path_mount+0x20b0/0x20b0 [ 670.218751] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 670.219323] ? syscall_enter_from_user_mode+0x1d/0x50 [ 670.219887] do_syscall_64+0x33/0x40 [ 670.220287] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 670.220843] RIP: 0033:0x7f3dafdedb19 [ 670.221245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 670.223242] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 670.224073] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 670.224851] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 670.225627] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 670.226404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 670.227189] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:50 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 26) 18:39:51 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:51 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:51 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() [ 670.467246] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 670.468337] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/50/file0 supports timestamps until 2038 (0x7fffffff) [ 670.479180] FAULT_INJECTION: forcing a failure. [ 670.479180] name failslab, interval 1, probability 0, space 0, times 0 [ 670.481772] CPU: 0 PID: 6449 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 670.483312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 670.485109] Call Trace: [ 670.485688] dump_stack+0x107/0x167 [ 670.486485] should_fail.cold+0x5/0xa [ 670.487349] should_failslab+0x5/0x20 [ 670.488177] __kmalloc_track_caller+0x79/0x3c0 [ 670.489167] ? parse_opts.part.0+0x8e/0x340 [ 670.490114] kstrdup+0x36/0x70 [ 670.490842] parse_opts.part.0+0x8e/0x340 [ 670.491767] ? p9_fd_show_options+0x1c0/0x1c0 [ 670.492769] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 670.493932] ? quarantine_put+0x8b/0x1a0 [ 670.494849] ? trace_hardirqs_on+0x5b/0x180 [ 670.495809] ? kfree+0xd7/0x390 [ 670.496556] p9_fd_create+0x98/0x4a0 [ 670.497384] ? p9_conn_create+0x510/0x510 [ 670.498296] ? p9_client_create+0x798/0x1090 [ 670.499275] ? kfree+0xd7/0x390 [ 670.500005] ? do_raw_spin_unlock+0x4f/0x220 [ 670.500985] p9_client_create+0x7ff/0x1090 [ 670.501931] ? p9_client_flush+0x430/0x430 [ 670.502888] ? lockdep_init_map_type+0x2c7/0x780 [ 670.503945] ? rcu_read_lock_sched_held+0x3e/0x80 [ 670.505028] ? __raw_spin_lock_init+0x36/0x110 [ 670.506061] v9fs_session_init+0x1dd/0x16a0 [ 670.507058] ? kmem_cache_alloc_trace+0x151/0x360 [ 670.508139] ? v9fs_show_options+0x690/0x690 [ 670.509148] ? kasan_unpoison_shadow+0x33/0x50 [ 670.510166] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 670.511300] v9fs_mount+0x79/0x8f0 [ 670.512097] ? v9fs_write_inode+0x60/0x60 [ 670.513025] legacy_get_tree+0x105/0x220 [ 670.513937] vfs_get_tree+0x8e/0x300 [ 670.514799] path_mount+0x13be/0x20b0 [ 670.515652] ? strncpy_from_user+0x9e/0x470 [ 670.516621] ? finish_automount+0xa40/0xa40 [ 670.517587] ? getname_flags.part.0+0x1dd/0x4f0 [ 670.518623] ? _copy_from_user+0xfb/0x1b0 [ 670.519576] __x64_sys_mount+0x282/0x300 [ 670.520494] ? path_mount+0x20b0/0x20b0 [ 670.521393] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 670.522571] ? syscall_enter_from_user_mode+0x1d/0x50 [ 670.523717] do_syscall_64+0x33/0x40 [ 670.524557] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 670.525661] RIP: 0033:0x7f3dafdedb19 [ 670.526507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 670.530508] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 670.532195] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 670.533751] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 670.535324] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 670.536975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 670.538596] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 670.540331] 9pnet: Insufficient options for proto=fd 18:39:51 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 27) [ 670.670555] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 670.671917] ext4 filesystem being mounted at /syzkaller-testdir550774415/syzkaller.6Wxt4r/52/file0 supports timestamps until 2038 (0x7fffffff) [ 670.678358] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 670.680052] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/45/file0 supports timestamps until 2038 (0x7fffffff) 18:39:51 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:39:51 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 670.768348] debugfs: Directory 'loop0' with parent 'block' already present! [ 670.792106] FAULT_INJECTION: forcing a failure. [ 670.792106] name failslab, interval 1, probability 0, space 0, times 0 [ 670.793983] CPU: 1 PID: 6467 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 670.795063] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 670.796358] Call Trace: [ 670.796764] dump_stack+0x107/0x167 [ 670.797327] should_fail.cold+0x5/0xa [ 670.797908] ? create_object.isra.0+0x3a/0xa20 [ 670.798606] should_failslab+0x5/0x20 [ 670.799195] kmem_cache_alloc+0x5b/0x360 [ 670.799814] ? legacy_get_tree+0x105/0x220 [ 670.800462] ? vfs_get_tree+0x8e/0x300 [ 670.801061] create_object.isra.0+0x3a/0xa20 [ 670.801736] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 670.802514] __kmalloc_track_caller+0x177/0x3c0 [ 670.803240] ? parse_opts.part.0+0x8e/0x340 [ 670.803838] kstrdup+0x36/0x70 [ 670.804200] parse_opts.part.0+0x8e/0x340 [ 670.804669] ? p9_fd_show_options+0x1c0/0x1c0 [ 670.805179] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 670.805767] ? quarantine_put+0x8b/0x1a0 [ 670.806226] ? trace_hardirqs_on+0x5b/0x180 [ 670.806731] ? kfree+0xd7/0x390 [ 670.807106] p9_fd_create+0x98/0x4a0 [ 670.807532] ? p9_conn_create+0x510/0x510 [ 670.808003] ? p9_client_create+0x798/0x1090 [ 670.808492] ? kfree+0xd7/0x390 [ 670.808869] ? do_raw_spin_unlock+0x4f/0x220 [ 670.809369] p9_client_create+0x7ff/0x1090 [ 670.809849] ? p9_client_flush+0x430/0x430 [ 670.810331] ? lockdep_init_map_type+0x2c7/0x780 [ 670.810863] ? rcu_read_lock_sched_held+0x3e/0x80 [ 670.811412] ? __raw_spin_lock_init+0x36/0x110 [ 670.811941] v9fs_session_init+0x1dd/0x16a0 [ 670.812428] ? kmem_cache_alloc_trace+0x151/0x360 [ 670.812974] ? v9fs_show_options+0x690/0x690 [ 670.813483] ? kasan_unpoison_shadow+0x33/0x50 [ 670.814014] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 670.814600] v9fs_mount+0x79/0x8f0 [ 670.815018] ? v9fs_write_inode+0x60/0x60 [ 670.815491] legacy_get_tree+0x105/0x220 [ 670.815951] vfs_get_tree+0x8e/0x300 [ 670.816368] path_mount+0x13be/0x20b0 [ 670.816792] ? strncpy_from_user+0x9e/0x470 [ 670.817285] ? finish_automount+0xa40/0xa40 [ 670.817788] ? getname_flags.part.0+0x1dd/0x4f0 [ 670.818313] ? _copy_from_user+0xfb/0x1b0 [ 670.818796] __x64_sys_mount+0x282/0x300 [ 670.819258] ? path_mount+0x20b0/0x20b0 [ 670.819702] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 670.820286] ? syscall_enter_from_user_mode+0x1d/0x50 [ 670.820864] do_syscall_64+0x33/0x40 [ 670.821273] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 670.821851] RIP: 0033:0x7f3dafdedb19 [ 670.822274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 670.824380] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 670.825239] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 670.826022] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 670.826819] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 670.827615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 670.828411] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:39:51 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:51 executing program 3: unshare(0x28020600) unshare(0x20000000) unshare(0x20100) r0 = fork() tkill(r0, 0xb) r1 = fork() ptrace$setopts(0x4200, r1, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x2173, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r4}) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup2(r2, 0xffffffffffffffff) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x4e23, 0x3, @mcast1, 0x2}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, &(0x7f00000000c0), 0x2, &(0x7f0000000140)) unshare(0x40000000) 18:39:51 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:39:51 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:39:51 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 28) 18:39:51 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 671.066509] FAULT_INJECTION: forcing a failure. [ 671.066509] name failslab, interval 1, probability 0, space 0, times 0 [ 671.067977] CPU: 1 PID: 6475 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 671.068730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.069621] Call Trace: [ 671.069917] dump_stack+0x107/0x167 [ 671.070315] should_fail.cold+0x5/0xa [ 671.070740] should_failslab+0x5/0x20 [ 671.071165] __kmalloc_track_caller+0x79/0x3c0 [ 671.071659] ? match_number+0xaf/0x1d0 [ 671.072084] kmemdup_nul+0x2d/0xa0 [ 671.072465] match_number+0xaf/0x1d0 [ 671.072869] ? match_u64+0x190/0x190 [ 671.073269] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 671.073793] ? memcpy+0x39/0x60 [ 671.074164] parse_opts.part.0+0x1f3/0x340 [ 671.074624] ? p9_fd_show_options+0x1c0/0x1c0 [ 671.075118] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 671.075685] ? trace_hardirqs_on+0x5b/0x180 [ 671.076168] ? kfree+0xd7/0x390 [ 671.076546] p9_fd_create+0x98/0x4a0 [ 671.076948] ? p9_conn_create+0x510/0x510 [ 671.077412] ? p9_client_create+0x798/0x1090 [ 671.077912] ? kfree+0xd7/0x390 [ 671.078289] ? do_raw_spin_unlock+0x4f/0x220 [ 671.078789] p9_client_create+0x7ff/0x1090 [ 671.079267] ? p9_client_flush+0x430/0x430 [ 671.079735] ? lockdep_init_map_type+0x2c7/0x780 [ 671.080264] ? rcu_read_lock_sched_held+0x3e/0x80 [ 671.080799] ? __raw_spin_lock_init+0x36/0x110 [ 671.081313] v9fs_session_init+0x1dd/0x16a0 [ 671.081790] ? kmem_cache_alloc_trace+0x151/0x360 [ 671.082322] ? v9fs_show_options+0x690/0x690 [ 671.082822] ? kasan_unpoison_shadow+0x33/0x50 [ 671.083342] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 671.083901] v9fs_mount+0x79/0x8f0 [ 671.084286] ? v9fs_write_inode+0x60/0x60 [ 671.084752] legacy_get_tree+0x105/0x220 [ 671.085211] vfs_get_tree+0x8e/0x300 [ 671.085626] path_mount+0x13be/0x20b0 [ 671.086048] ? strncpy_from_user+0x9e/0x470 [ 671.086526] ? finish_automount+0xa40/0xa40 [ 671.087001] ? getname_flags.part.0+0x1dd/0x4f0 [ 671.087518] ? _copy_from_user+0xfb/0x1b0 [ 671.087976] __x64_sys_mount+0x282/0x300 [ 671.088431] ? path_mount+0x20b0/0x20b0 [ 671.088882] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 671.089470] ? syscall_enter_from_user_mode+0x1d/0x50 [ 671.090050] do_syscall_64+0x33/0x40 [ 671.090467] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 671.091026] RIP: 0033:0x7f3dafdedb19 [ 671.091433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.093406] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 671.094228] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 671.095004] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 671.095770] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 671.096555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.097347] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 671.124841] 9pnet: Insufficient options for proto=fd 18:39:51 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 29) [ 671.275879] FAULT_INJECTION: forcing a failure. [ 671.275879] name failslab, interval 1, probability 0, space 0, times 0 [ 671.277218] CPU: 1 PID: 6484 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 671.277970] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 671.278864] Call Trace: [ 671.279160] dump_stack+0x107/0x167 [ 671.279560] should_fail.cold+0x5/0xa [ 671.279970] ? create_object.isra.0+0x3a/0xa20 [ 671.280497] should_failslab+0x5/0x20 [ 671.280904] kmem_cache_alloc+0x5b/0x360 [ 671.281358] create_object.isra.0+0x3a/0xa20 [ 671.281835] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 671.282393] __kmalloc_track_caller+0x177/0x3c0 [ 671.282907] ? match_number+0xaf/0x1d0 [ 671.283343] kmemdup_nul+0x2d/0xa0 [ 671.283741] match_number+0xaf/0x1d0 [ 671.284149] ? match_u64+0x190/0x190 [ 671.284565] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 671.285101] ? memcpy+0x39/0x60 [ 671.285478] parse_opts.part.0+0x1f3/0x340 [ 671.285952] ? p9_fd_show_options+0x1c0/0x1c0 [ 671.286454] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 671.287059] ? trace_hardirqs_on+0x5b/0x180 [ 671.287537] ? kfree+0xd7/0x390 [ 671.287906] p9_fd_create+0x98/0x4a0 [ 671.288323] ? p9_conn_create+0x510/0x510 [ 671.288776] ? p9_client_create+0x798/0x1090 [ 671.289255] ? kfree+0xd7/0x390 [ 671.289615] ? do_raw_spin_unlock+0x4f/0x220 [ 671.290092] p9_client_create+0x7ff/0x1090 [ 671.290553] ? p9_client_flush+0x430/0x430 [ 671.291018] ? lockdep_init_map_type+0x2c7/0x780 [ 671.291528] ? rcu_read_lock_sched_held+0x3e/0x80 [ 671.292047] ? __raw_spin_lock_init+0x36/0x110 [ 671.292544] v9fs_session_init+0x1dd/0x16a0 [ 671.293021] ? kmem_cache_alloc_trace+0x151/0x360 [ 671.293540] ? v9fs_show_options+0x690/0x690 [ 671.294027] ? kasan_unpoison_shadow+0x33/0x50 [ 671.294528] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 671.295112] v9fs_mount+0x79/0x8f0 [ 671.295508] ? v9fs_write_inode+0x60/0x60 [ 671.295970] legacy_get_tree+0x105/0x220 [ 671.296420] vfs_get_tree+0x8e/0x300 [ 671.296834] path_mount+0x13be/0x20b0 [ 671.297267] ? strncpy_from_user+0x9e/0x470 [ 671.297749] ? finish_automount+0xa40/0xa40 [ 671.298233] ? getname_flags.part.0+0x1dd/0x4f0 [ 671.298754] ? _copy_from_user+0xfb/0x1b0 [ 671.299222] __x64_sys_mount+0x282/0x300 [ 671.299670] ? path_mount+0x20b0/0x20b0 [ 671.300115] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 671.300700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 671.301273] do_syscall_64+0x33/0x40 [ 671.301693] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 671.302266] RIP: 0033:0x7f3dafdedb19 [ 671.302697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.304726] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 671.305573] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 671.306357] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 671.307162] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 671.307943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.308723] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 671.348533] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 671.364955] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/51/file0 supports timestamps until 2038 (0x7fffffff) [ 671.993356] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 671.995852] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 671.997471] ext4 filesystem being mounted at /syzkaller-testdir550774415/syzkaller.6Wxt4r/53/file0 supports timestamps until 2038 (0x7fffffff) [ 672.002059] ext4 filesystem being mounted at /syzkaller-testdir739428249/syzkaller.rUe0I0/34/file0 supports timestamps until 2038 (0x7fffffff) [ 672.035593] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 672.040267] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/46/file0 supports timestamps until 2038 (0x7fffffff) [ 685.843830] FAULT_INJECTION: forcing a failure. [ 685.843830] name failslab, interval 1, probability 0, space 0, times 0 [ 685.846384] CPU: 0 PID: 6522 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 685.847936] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 685.849980] Call Trace: [ 685.850553] dump_stack+0x107/0x167 [ 685.851386] should_fail.cold+0x5/0xa [ 685.852217] should_failslab+0x5/0x20 [ 685.853048] __kmalloc_track_caller+0x79/0x3c0 [ 685.854049] ? match_number+0xaf/0x1d0 [ 685.854906] ? kfree+0xd7/0x390 [ 685.855652] kmemdup_nul+0x2d/0xa0 [ 685.856426] match_number+0xaf/0x1d0 [ 685.857227] ? match_u64+0x190/0x190 [ 685.858029] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 685.859100] ? memcpy+0x39/0x60 [ 685.859824] parse_opts.part.0+0x1f3/0x340 [ 685.860739] ? p9_fd_show_options+0x1c0/0x1c0 [ 685.861713] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 685.862843] ? trace_hardirqs_on+0x5b/0x180 [ 685.863807] ? kfree+0xd7/0x390 [ 685.864530] p9_fd_create+0x98/0x4a0 [ 685.865331] ? p9_conn_create+0x510/0x510 [ 685.866219] ? p9_client_create+0x798/0x1090 [ 685.867194] ? kfree+0xd7/0x390 [ 685.867908] ? do_raw_spin_unlock+0x4f/0x220 [ 685.868864] p9_client_create+0x7ff/0x1090 [ 685.869797] ? p9_client_flush+0x430/0x430 [ 685.870739] ? lockdep_init_map_type+0x2c7/0x780 [ 685.871800] ? rcu_read_lock_sched_held+0x3e/0x80 [ 685.872865] ? __raw_spin_lock_init+0x36/0x110 [ 685.873879] v9fs_session_init+0x1dd/0x16a0 [ 685.874833] ? kmem_cache_alloc_trace+0x151/0x360 [ 685.875911] ? v9fs_show_options+0x690/0x690 [ 685.876896] ? kasan_unpoison_shadow+0x33/0x50 [ 685.877891] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 685.879040] v9fs_mount+0x79/0x8f0 [ 685.879812] ? v9fs_write_inode+0x60/0x60 [ 685.880709] legacy_get_tree+0x105/0x220 [ 685.881607] vfs_get_tree+0x8e/0x300 [ 685.882416] path_mount+0x13be/0x20b0 [ 685.883275] ? strncpy_from_user+0x9e/0x470 [ 685.884214] ? finish_automount+0xa40/0xa40 [ 685.885149] ? getname_flags.part.0+0x1dd/0x4f0 [ 685.886152] ? _copy_from_user+0xfb/0x1b0 [ 685.887085] __x64_sys_mount+0x282/0x300 [ 685.887961] ? path_mount+0x20b0/0x20b0 [ 685.888825] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 685.889957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 685.891108] do_syscall_64+0x33/0x40 [ 685.891919] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 685.893033] RIP: 0033:0x7f3dafdedb19 [ 685.893840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.897829] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 685.899518] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 685.901055] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 685.902581] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 685.904138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 685.905678] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 685.907595] 9pnet: Insufficient options for proto=fd 18:40:06 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:06 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:06 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:06 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:40:06 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 30) 18:40:06 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:40:06 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:06 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:40:06 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 31) 18:40:06 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:40:06 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:06 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:40:06 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:06 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 686.171920] debugfs: Directory 'loop0' with parent 'block' already present! [ 686.239904] FAULT_INJECTION: forcing a failure. [ 686.239904] name failslab, interval 1, probability 0, space 0, times 0 [ 686.242439] CPU: 0 PID: 6555 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 686.243962] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 686.245751] Call Trace: [ 686.246337] dump_stack+0x107/0x167 [ 686.247164] should_fail.cold+0x5/0xa [ 686.247987] ? create_object.isra.0+0x3a/0xa20 [ 686.248977] should_failslab+0x5/0x20 [ 686.249801] kmem_cache_alloc+0x5b/0x360 [ 686.250684] create_object.isra.0+0x3a/0xa20 [ 686.251655] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 686.252756] __kmalloc_track_caller+0x177/0x3c0 [ 686.253756] ? match_number+0xaf/0x1d0 [ 686.254606] kmemdup_nul+0x2d/0xa0 [ 686.255393] match_number+0xaf/0x1d0 [ 686.256197] ? match_u64+0x190/0x190 [ 686.256998] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 686.258041] ? memcpy+0x39/0x60 [ 686.258760] parse_opts.part.0+0x1f3/0x340 [ 686.259712] ? p9_fd_show_options+0x1c0/0x1c0 [ 686.260686] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 686.261816] ? trace_hardirqs_on+0x5b/0x180 [ 686.262746] ? kfree+0xd7/0x390 [ 686.263492] p9_fd_create+0x98/0x4a0 [ 686.264294] ? p9_conn_create+0x510/0x510 [ 686.265182] ? p9_client_create+0x798/0x1090 [ 686.266128] ? kfree+0xd7/0x390 [ 686.266847] ? do_raw_spin_unlock+0x4f/0x220 [ 686.267823] p9_client_create+0x7ff/0x1090 [ 686.268752] ? p9_client_flush+0x430/0x430 [ 686.269672] ? lockdep_init_map_type+0x2c7/0x780 [ 686.270694] ? rcu_read_lock_sched_held+0x3e/0x80 [ 686.271775] ? __raw_spin_lock_init+0x36/0x110 [ 686.272783] v9fs_session_init+0x1dd/0x16a0 [ 686.273730] ? kmem_cache_alloc_trace+0x151/0x360 [ 686.274771] ? v9fs_show_options+0x690/0x690 [ 686.275777] ? kasan_unpoison_shadow+0x33/0x50 [ 686.276776] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 686.277871] v9fs_mount+0x79/0x8f0 [ 686.278645] ? v9fs_write_inode+0x60/0x60 [ 686.279718] legacy_get_tree+0x105/0x220 [ 686.280713] vfs_get_tree+0x8e/0x300 [ 686.281607] path_mount+0x13be/0x20b0 [ 686.282532] ? strncpy_from_user+0x9e/0x470 [ 686.283604] ? finish_automount+0xa40/0xa40 [ 686.284645] ? getname_flags.part.0+0x1dd/0x4f0 [ 686.285757] ? _copy_from_user+0xfb/0x1b0 [ 686.286768] __x64_sys_mount+0x282/0x300 [ 686.287752] ? path_mount+0x20b0/0x20b0 [ 686.288719] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 686.289983] ? syscall_enter_from_user_mode+0x1d/0x50 [ 686.291234] do_syscall_64+0x33/0x40 [ 686.292130] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 686.293364] RIP: 0033:0x7f3dafdedb19 [ 686.294260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 686.298411] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 686.300059] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 686.301593] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 686.303147] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 686.304691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 686.306228] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:06 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 686.377866] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 686.379025] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/47/file0 supports timestamps until 2038 (0x7fffffff) [ 686.652745] debugfs: Directory 'loop0' with parent 'block' already present! 18:40:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 32) 18:40:25 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:40:25 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:25 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:25 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:25 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:25 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:40:25 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 704.976271] FAULT_INJECTION: forcing a failure. [ 704.976271] name failslab, interval 1, probability 0, space 0, times 0 [ 704.978747] CPU: 1 PID: 6595 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 704.980154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 704.981865] Call Trace: [ 704.982414] dump_stack+0x107/0x167 [ 704.983176] should_fail.cold+0x5/0xa [ 704.983963] ? p9_fd_create+0x161/0x4a0 [ 704.984778] should_failslab+0x5/0x20 [ 704.985559] kmem_cache_alloc_trace+0x55/0x360 [ 704.986501] p9_fd_create+0x161/0x4a0 [ 704.987296] ? p9_conn_create+0x510/0x510 [ 704.988138] ? p9_client_create+0x798/0x1090 [ 704.989046] ? kfree+0xd7/0x390 [ 704.989730] ? do_raw_spin_unlock+0x4f/0x220 [ 704.990646] p9_client_create+0x7ff/0x1090 [ 704.991539] ? p9_client_flush+0x430/0x430 [ 704.992423] ? lockdep_init_map_type+0x2c7/0x780 [ 704.993398] ? rcu_read_lock_sched_held+0x3e/0x80 [ 704.994401] ? __raw_spin_lock_init+0x36/0x110 [ 704.995379] v9fs_session_init+0x1dd/0x16a0 [ 704.996289] ? kmem_cache_alloc_trace+0x151/0x360 [ 704.997285] ? v9fs_show_options+0x690/0x690 [ 704.998218] ? kasan_unpoison_shadow+0x33/0x50 [ 704.999170] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 705.000231] v9fs_mount+0x79/0x8f0 [ 705.000971] ? v9fs_write_inode+0x60/0x60 [ 705.001832] legacy_get_tree+0x105/0x220 [ 705.002678] vfs_get_tree+0x8e/0x300 [ 705.003461] path_mount+0x13be/0x20b0 [ 705.004253] ? strncpy_from_user+0x9e/0x470 [ 705.005153] ? finish_automount+0xa40/0xa40 [ 705.006043] ? getname_flags.part.0+0x1dd/0x4f0 [ 705.007008] ? _copy_from_user+0xfb/0x1b0 [ 705.007883] __x64_sys_mount+0x282/0x300 [ 705.008723] ? path_mount+0x20b0/0x20b0 [ 705.009550] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 705.010617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 705.011695] do_syscall_64+0x33/0x40 [ 705.012455] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 705.013513] RIP: 0033:0x7f3dafdedb19 [ 705.014273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.018086] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 705.019642] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 705.021095] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 705.022553] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 705.024028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 705.025492] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 33) [ 705.100550] FAULT_INJECTION: forcing a failure. [ 705.100550] name failslab, interval 1, probability 0, space 0, times 0 [ 705.103072] CPU: 1 PID: 6609 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 705.104546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 705.106278] Call Trace: [ 705.106837] dump_stack+0x107/0x167 [ 705.107615] should_fail.cold+0x5/0xa [ 705.108416] ? create_object.isra.0+0x3a/0xa20 [ 705.109378] should_failslab+0x5/0x20 [ 705.110179] kmem_cache_alloc+0x5b/0x360 [ 705.111028] ? p9_fd_show_options+0x1c0/0x1c0 [ 705.111986] create_object.isra.0+0x3a/0xa20 [ 705.112904] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 705.113989] kmem_cache_alloc_trace+0x151/0x360 [ 705.114976] p9_fd_create+0x161/0x4a0 [ 705.115800] ? p9_conn_create+0x510/0x510 [ 705.116663] ? p9_client_create+0x798/0x1090 [ 705.117586] ? kfree+0xd7/0x390 [ 705.118285] ? do_raw_spin_unlock+0x4f/0x220 [ 705.119234] p9_client_create+0x7ff/0x1090 [ 705.120132] ? p9_client_flush+0x430/0x430 [ 705.121039] ? lockdep_init_map_type+0x2c7/0x780 [ 705.122032] ? rcu_read_lock_sched_held+0x3e/0x80 [ 705.123059] ? __raw_spin_lock_init+0x36/0x110 [ 705.124274] v9fs_session_init+0x1dd/0x16a0 [ 705.125382] ? kmem_cache_alloc_trace+0x151/0x360 [ 705.126593] ? v9fs_show_options+0x690/0x690 [ 705.127744] ? kasan_unpoison_shadow+0x33/0x50 [ 705.128900] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 705.130192] v9fs_mount+0x79/0x8f0 [ 705.131097] ? v9fs_write_inode+0x60/0x60 [ 705.132147] legacy_get_tree+0x105/0x220 [ 705.133179] vfs_get_tree+0x8e/0x300 [ 705.134122] path_mount+0x13be/0x20b0 [ 705.135093] ? strncpy_from_user+0x9e/0x470 [ 705.136192] ? finish_automount+0xa40/0xa40 [ 705.137263] ? getname_flags.part.0+0x1dd/0x4f0 [ 705.138392] ? _copy_from_user+0xfb/0x1b0 [ 705.139436] __x64_sys_mount+0x282/0x300 [ 705.140416] ? path_mount+0x20b0/0x20b0 [ 705.141230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 705.142305] ? syscall_enter_from_user_mode+0x1d/0x50 [ 705.143365] do_syscall_64+0x33/0x40 [ 705.144124] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 705.145222] RIP: 0033:0x7f3dafdedb19 [ 705.146035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.150030] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 705.151711] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 705.153270] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 705.154822] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 705.156404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 705.157962] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 34) [ 705.230212] FAULT_INJECTION: forcing a failure. [ 705.230212] name failslab, interval 1, probability 0, space 0, times 0 [ 705.232761] CPU: 1 PID: 6618 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 705.234286] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 705.236138] Call Trace: [ 705.236730] dump_stack+0x107/0x167 [ 705.237543] should_fail.cold+0x5/0xa [ 705.238391] ? p9_client_prepare_req.part.0+0x3a/0xb30 [ 705.239581] should_failslab+0x5/0x20 [ 705.240425] kmem_cache_alloc+0x5b/0x360 [ 705.241320] ? __lockdep_reset_lock+0x180/0x180 [ 705.242361] p9_client_prepare_req.part.0+0x3a/0xb30 [ 705.243493] ? find_held_lock+0x2c/0x110 [ 705.244401] p9_client_rpc+0x220/0x1210 [ 705.245278] ? __fget_files+0x26d/0x480 [ 705.246169] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 705.247361] ? hpet_poll+0x76/0x160 [ 705.248164] ? virtcons_probe+0xc90/0xc90 [ 705.249079] ? p9_fd_poll+0x1e0/0x2c0 [ 705.249947] ? p9_fd_create+0x357/0x4a0 [ 705.250820] ? p9_conn_create+0x510/0x510 [ 705.251748] ? p9_client_create+0x798/0x1090 [ 705.252716] ? kfree+0xd7/0x390 [ 705.253444] ? do_raw_spin_unlock+0x4f/0x220 [ 705.254417] p9_client_create+0xa76/0x1090 [ 705.255369] ? p9_client_flush+0x430/0x430 [ 705.256311] ? lockdep_init_map_type+0x2c7/0x780 [ 705.257355] ? rcu_read_lock_sched_held+0x3e/0x80 [ 705.258422] ? __raw_spin_lock_init+0x36/0x110 [ 705.259467] v9fs_session_init+0x1dd/0x16a0 [ 705.260435] ? kmem_cache_alloc_trace+0x151/0x360 [ 705.261515] ? v9fs_show_options+0x690/0x690 [ 705.262507] ? kasan_unpoison_shadow+0x33/0x50 [ 705.263524] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 705.264648] v9fs_mount+0x79/0x8f0 [ 705.265439] ? v9fs_write_inode+0x60/0x60 [ 705.266354] legacy_get_tree+0x105/0x220 [ 705.267278] vfs_get_tree+0x8e/0x300 [ 705.268102] path_mount+0x13be/0x20b0 [ 705.268948] ? strncpy_from_user+0x9e/0x470 [ 705.269900] ? finish_automount+0xa40/0xa40 [ 705.270853] ? getname_flags.part.0+0x1dd/0x4f0 [ 705.271881] ? _copy_from_user+0xfb/0x1b0 [ 705.272810] __x64_sys_mount+0x282/0x300 [ 705.273706] ? path_mount+0x20b0/0x20b0 [ 705.274587] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 705.275757] ? syscall_enter_from_user_mode+0x1d/0x50 [ 705.276897] do_syscall_64+0x33/0x40 [ 705.277720] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 705.278850] RIP: 0033:0x7f3dafdedb19 [ 705.279677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.283717] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 705.285412] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 705.286980] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 705.288559] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 705.290122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 705.291695] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:40 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 35) 18:40:40 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:40:40 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:40 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 719.671819] FAULT_INJECTION: forcing a failure. [ 719.671819] name failslab, interval 1, probability 0, space 0, times 0 [ 719.673065] CPU: 1 PID: 6625 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 719.673806] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 719.674682] Call Trace: [ 719.674972] dump_stack+0x107/0x167 [ 719.675373] should_fail.cold+0x5/0xa [ 719.675798] ? create_object.isra.0+0x3a/0xa20 [ 719.676287] should_failslab+0x5/0x20 [ 719.676697] kmem_cache_alloc+0x5b/0x360 [ 719.677147] create_object.isra.0+0x3a/0xa20 [ 719.677632] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 719.678188] kmem_cache_alloc+0x159/0x360 [ 719.678645] ? __lockdep_reset_lock+0x180/0x180 [ 719.679155] p9_client_prepare_req.part.0+0x3a/0xb30 [ 719.679704] ? find_held_lock+0x2c/0x110 [ 719.680142] p9_client_rpc+0x220/0x1210 [ 719.680574] ? __fget_files+0x26d/0x480 [ 719.681010] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 719.681608] ? hpet_poll+0x76/0x160 [ 719.682015] ? virtcons_probe+0xc90/0xc90 [ 719.682476] ? p9_fd_poll+0x1e0/0x2c0 [ 719.682909] ? p9_fd_create+0x357/0x4a0 [ 719.683371] ? p9_conn_create+0x510/0x510 [ 719.683829] ? p9_client_create+0x798/0x1090 [ 719.684299] ? kfree+0xd7/0x390 [ 719.684669] ? do_raw_spin_unlock+0x4f/0x220 [ 719.685160] p9_client_create+0xa76/0x1090 [ 719.685619] ? p9_client_flush+0x430/0x430 [ 719.686095] ? lockdep_init_map_type+0x2c7/0x780 [ 719.686631] ? rcu_read_lock_sched_held+0x3e/0x80 [ 719.687172] ? __raw_spin_lock_init+0x36/0x110 [ 719.687701] v9fs_session_init+0x1dd/0x16a0 [ 719.688184] ? irqentry_enter+0x26/0x60 [ 719.688633] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 719.689241] ? trace_hardirqs_on+0x5b/0x180 [ 719.689733] ? v9fs_show_options+0x690/0x690 [ 719.690236] ? kasan_unpoison_shadow+0x33/0x50 [ 719.690742] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 719.691281] v9fs_mount+0x79/0x8f0 [ 719.691686] ? v9fs_write_inode+0x60/0x60 [ 719.692148] legacy_get_tree+0x105/0x220 [ 719.692602] vfs_get_tree+0x8e/0x300 [ 719.693025] path_mount+0x13be/0x20b0 [ 719.693452] ? strncpy_from_user+0x9e/0x470 [ 719.693943] ? finish_automount+0xa40/0xa40 [ 719.694424] ? getname_flags.part.0+0x1dd/0x4f0 [ 719.694943] ? _copy_from_user+0xfb/0x1b0 [ 719.695425] __x64_sys_mount+0x282/0x300 [ 719.695884] ? path_mount+0x20b0/0x20b0 [ 719.696328] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 719.696915] ? syscall_enter_from_user_mode+0x1d/0x50 [ 719.697492] do_syscall_64+0x33/0x40 [ 719.697926] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 719.698507] RIP: 0033:0x7f3dafdedb19 [ 719.698927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 719.701042] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.701900] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 719.702707] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 719.703543] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 719.704361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 719.705170] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:40 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:40 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) 18:40:40 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:40 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:40 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 36) [ 719.789598] FAULT_INJECTION: forcing a failure. [ 719.789598] name failslab, interval 1, probability 0, space 0, times 0 [ 719.792147] CPU: 0 PID: 6645 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 719.793622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 719.795437] Call Trace: [ 719.796023] dump_stack+0x107/0x167 [ 719.796818] should_fail.cold+0x5/0xa [ 719.797644] ? p9_fcall_init+0x97/0x210 [ 719.798515] should_failslab+0x5/0x20 [ 719.799377] __kmalloc+0x72/0x3f0 [ 719.800162] p9_fcall_init+0x97/0x210 [ 719.801024] p9_client_prepare_req.part.0+0x8c/0xb30 [ 719.802166] ? find_held_lock+0x2c/0x110 [ 719.803097] p9_client_rpc+0x220/0x1210 [ 719.804010] ? __fget_files+0x26d/0x480 [ 719.804914] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 719.806114] ? hpet_poll+0x76/0x160 [ 719.806930] ? virtcons_probe+0xc90/0xc90 [ 719.807884] ? p9_fd_poll+0x1e0/0x2c0 [ 719.808672] ? p9_fd_create+0x357/0x4a0 [ 719.809470] ? p9_conn_create+0x510/0x510 [ 719.810298] ? p9_client_create+0x798/0x1090 [ 719.811180] ? kfree+0xd7/0x390 [ 719.811873] ? do_raw_spin_unlock+0x4f/0x220 [ 719.812789] p9_client_create+0xa76/0x1090 [ 719.813664] ? p9_client_flush+0x430/0x430 [ 719.814540] ? lockdep_init_map_type+0x2c7/0x780 [ 719.815534] ? rcu_read_lock_sched_held+0x3e/0x80 [ 719.816524] ? __raw_spin_lock_init+0x36/0x110 [ 719.817471] v9fs_session_init+0x1dd/0x16a0 [ 719.818370] ? kmem_cache_alloc_trace+0x151/0x360 [ 719.819380] ? v9fs_show_options+0x690/0x690 [ 719.820327] ? kasan_unpoison_shadow+0x33/0x50 [ 719.821270] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 719.822325] v9fs_mount+0x79/0x8f0 [ 719.823046] ? v9fs_write_inode+0x60/0x60 [ 719.823920] legacy_get_tree+0x105/0x220 [ 719.824836] vfs_get_tree+0x8e/0x300 [ 719.825681] path_mount+0x13be/0x20b0 [ 719.826544] ? strncpy_from_user+0x9e/0x470 [ 719.827554] ? finish_automount+0xa40/0xa40 [ 719.828532] ? getname_flags.part.0+0x1dd/0x4f0 [ 719.829577] ? _copy_from_user+0xfb/0x1b0 [ 719.830531] __x64_sys_mount+0x282/0x300 [ 719.831485] ? path_mount+0x20b0/0x20b0 [ 719.832387] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 719.833518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 719.834557] do_syscall_64+0x33/0x40 [ 719.835313] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 719.836361] RIP: 0033:0x7f3dafdedb19 [ 719.837122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 719.840882] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.842575] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 719.844200] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 719.845802] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 719.847435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 719.849037] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:40 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 37) [ 719.893931] FAULT_INJECTION: forcing a failure. [ 719.893931] name failslab, interval 1, probability 0, space 0, times 0 [ 719.895267] CPU: 1 PID: 6656 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 719.896033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 719.896954] Call Trace: [ 719.897251] dump_stack+0x107/0x167 [ 719.897661] should_fail.cold+0x5/0xa [ 719.898085] ? create_object.isra.0+0x3a/0xa20 [ 719.898605] should_failslab+0x5/0x20 [ 719.899028] kmem_cache_alloc+0x5b/0x360 [ 719.899500] create_object.isra.0+0x3a/0xa20 [ 719.899990] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 719.900566] __kmalloc+0x16e/0x3f0 [ 719.900968] p9_fcall_init+0x97/0x210 [ 719.901378] p9_client_prepare_req.part.0+0x8c/0xb30 [ 719.901948] ? find_held_lock+0x2c/0x110 [ 719.902403] p9_client_rpc+0x220/0x1210 [ 719.902843] ? __fget_files+0x26d/0x480 [ 719.903289] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 719.903893] ? hpet_poll+0x76/0x160 [ 719.904297] ? virtcons_probe+0xc90/0xc90 [ 719.904756] ? p9_fd_poll+0x1e0/0x2c0 [ 719.905185] ? p9_fd_create+0x357/0x4a0 [ 719.905627] ? p9_conn_create+0x510/0x510 [ 719.906085] ? p9_client_create+0x798/0x1090 [ 719.906558] ? kfree+0xd7/0x390 [ 719.906928] ? do_raw_spin_unlock+0x4f/0x220 [ 719.907428] p9_client_create+0xa76/0x1090 [ 719.907902] ? p9_client_flush+0x430/0x430 [ 719.908377] ? lockdep_init_map_type+0x2c7/0x780 [ 719.908903] ? rcu_read_lock_sched_held+0x3e/0x80 [ 719.909440] ? __raw_spin_lock_init+0x36/0x110 [ 719.909956] v9fs_session_init+0x1dd/0x16a0 [ 719.910447] ? kmem_cache_alloc_trace+0x151/0x360 [ 719.910985] ? v9fs_show_options+0x690/0x690 [ 719.911500] ? kasan_unpoison_shadow+0x33/0x50 [ 719.912010] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 719.912577] v9fs_mount+0x79/0x8f0 [ 719.912976] ? v9fs_write_inode+0x60/0x60 [ 719.913441] legacy_get_tree+0x105/0x220 [ 719.913895] vfs_get_tree+0x8e/0x300 [ 719.914310] path_mount+0x13be/0x20b0 [ 719.914737] ? strncpy_from_user+0x9e/0x470 [ 719.915217] ? finish_automount+0xa40/0xa40 [ 719.915683] ? getname_flags.part.0+0x1dd/0x4f0 [ 719.916202] ? _copy_from_user+0xfb/0x1b0 [ 719.916677] __x64_sys_mount+0x282/0x300 [ 719.917131] ? path_mount+0x20b0/0x20b0 [ 719.917575] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 719.918155] ? syscall_enter_from_user_mode+0x1d/0x50 [ 719.918728] do_syscall_64+0x33/0x40 [ 719.919144] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 719.919703] RIP: 0033:0x7f3dafdedb19 [ 719.920119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 719.922151] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 719.922991] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 719.923788] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 719.924575] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 719.925369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 719.926155] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:40 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 38) [ 719.974945] FAULT_INJECTION: forcing a failure. [ 719.974945] name failslab, interval 1, probability 0, space 0, times 0 [ 719.977569] CPU: 0 PID: 6660 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 719.979128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 719.981050] Call Trace: [ 719.981667] dump_stack+0x107/0x167 [ 719.982504] should_fail.cold+0x5/0xa [ 719.983396] ? p9_fcall_init+0x97/0x210 [ 719.984318] should_failslab+0x5/0x20 [ 719.985189] __kmalloc+0x72/0x3f0 [ 719.985975] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 719.987112] p9_fcall_init+0x97/0x210 [ 719.988013] p9_client_prepare_req.part.0+0xf4/0xb30 [ 719.989128] ? find_held_lock+0x2c/0x110 [ 719.990002] p9_client_rpc+0x220/0x1210 [ 719.990852] ? __fget_files+0x26d/0x480 [ 719.991758] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 719.992909] ? hpet_poll+0x76/0x160 [ 719.993701] ? virtcons_probe+0xc90/0xc90 [ 719.994598] ? p9_fd_poll+0x1e0/0x2c0 [ 719.995464] ? p9_fd_create+0x357/0x4a0 [ 719.996320] ? p9_conn_create+0x510/0x510 [ 719.997208] ? p9_client_create+0x798/0x1090 [ 719.998149] ? kfree+0xd7/0x390 [ 719.998866] ? do_raw_spin_unlock+0x4f/0x220 [ 719.999856] p9_client_create+0xa76/0x1090 [ 720.000777] ? p9_client_flush+0x430/0x430 [ 720.001698] ? lockdep_init_map_type+0x2c7/0x780 [ 720.002713] ? rcu_read_lock_sched_held+0x3e/0x80 [ 720.003776] ? __raw_spin_lock_init+0x36/0x110 [ 720.004774] v9fs_session_init+0x1dd/0x16a0 [ 720.005724] ? kmem_cache_alloc_trace+0x151/0x360 [ 720.006773] ? v9fs_show_options+0x690/0x690 [ 720.007794] ? kasan_unpoison_shadow+0x33/0x50 [ 720.008792] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 720.009903] v9fs_mount+0x79/0x8f0 [ 720.010687] ? v9fs_write_inode+0x60/0x60 [ 720.011610] legacy_get_tree+0x105/0x220 [ 720.012496] vfs_get_tree+0x8e/0x300 [ 720.013311] path_mount+0x13be/0x20b0 [ 720.014138] ? strncpy_from_user+0x9e/0x470 [ 720.015072] ? finish_automount+0xa40/0xa40 [ 720.016030] ? getname_flags.part.0+0x1dd/0x4f0 [ 720.017024] ? _copy_from_user+0xfb/0x1b0 [ 720.017932] __x64_sys_mount+0x282/0x300 [ 720.018804] ? path_mount+0x20b0/0x20b0 [ 720.019690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 720.020812] ? syscall_enter_from_user_mode+0x1d/0x50 [ 720.021924] do_syscall_64+0x33/0x40 [ 720.022724] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 720.023856] RIP: 0033:0x7f3dafdedb19 [ 720.024655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.028614] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 720.030242] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 720.031793] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 720.033320] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 18:40:40 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 720.034844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 720.036509] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:40 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 39) 18:40:40 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 720.167023] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 720.168231] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/55/file0 supports timestamps until 2038 (0x7fffffff) [ 720.183585] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 720.190602] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/49/file0 supports timestamps until 2038 (0x7fffffff) 18:40:40 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 720.210277] FAULT_INJECTION: forcing a failure. [ 720.210277] name failslab, interval 1, probability 0, space 0, times 0 [ 720.211479] CPU: 1 PID: 6676 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 720.212201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.213086] Call Trace: [ 720.213375] dump_stack+0x107/0x167 [ 720.213773] should_fail.cold+0x5/0xa [ 720.214190] ? create_object.isra.0+0x3a/0xa20 [ 720.214683] should_failslab+0x5/0x20 [ 720.215090] kmem_cache_alloc+0x5b/0x360 [ 720.215550] create_object.isra.0+0x3a/0xa20 [ 720.216027] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 720.216571] __kmalloc+0x16e/0x3f0 [ 720.216956] p9_fcall_init+0x97/0x210 [ 720.217362] p9_client_prepare_req.part.0+0xf4/0xb30 [ 720.217910] ? find_held_lock+0x2c/0x110 [ 720.218346] p9_client_rpc+0x220/0x1210 [ 720.218779] ? __fget_files+0x26d/0x480 [ 720.219211] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 720.219788] ? hpet_poll+0x76/0x160 [ 720.220201] ? virtcons_probe+0xc90/0xc90 [ 720.220658] ? p9_fd_poll+0x1e0/0x2c0 [ 720.221088] ? p9_fd_create+0x357/0x4a0 [ 720.221539] ? p9_conn_create+0x510/0x510 [ 720.221998] ? p9_client_create+0x798/0x1090 [ 720.222479] ? kfree+0xd7/0x390 [ 720.222844] ? do_raw_spin_unlock+0x4f/0x220 [ 720.223334] p9_client_create+0xa76/0x1090 [ 720.223810] ? p9_client_flush+0x430/0x430 [ 720.224291] ? lockdep_init_map_type+0x2c7/0x780 [ 720.224824] ? rcu_read_lock_sched_held+0x3e/0x80 [ 720.225358] ? __raw_spin_lock_init+0x36/0x110 [ 720.225874] v9fs_session_init+0x1dd/0x16a0 [ 720.226363] ? kmem_cache_alloc_trace+0x151/0x360 [ 720.226897] ? v9fs_show_options+0x690/0x690 [ 720.227403] ? kasan_unpoison_shadow+0x33/0x50 [ 720.227912] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 720.228483] v9fs_mount+0x79/0x8f0 [ 720.228893] ? v9fs_write_inode+0x60/0x60 [ 720.229358] legacy_get_tree+0x105/0x220 [ 720.229807] vfs_get_tree+0x8e/0x300 [ 720.230220] path_mount+0x13be/0x20b0 [ 720.230650] ? strncpy_from_user+0x9e/0x470 [ 720.231131] ? finish_automount+0xa40/0xa40 [ 720.231617] ? getname_flags.part.0+0x1dd/0x4f0 [ 720.232141] ? _copy_from_user+0xfb/0x1b0 [ 720.232613] __x64_sys_mount+0x282/0x300 [ 720.233061] ? path_mount+0x20b0/0x20b0 [ 720.233500] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 720.234083] ? syscall_enter_from_user_mode+0x1d/0x50 [ 720.234662] do_syscall_64+0x33/0x40 [ 720.235076] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 720.235658] RIP: 0033:0x7f3dafdedb19 [ 720.236073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.238104] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 720.238956] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 720.239750] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 720.240542] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 720.241339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 720.242144] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:40 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) 18:40:40 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) 18:40:40 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 40) [ 720.292108] FAULT_INJECTION: forcing a failure. [ 720.292108] name failslab, interval 1, probability 0, space 0, times 0 [ 720.293531] CPU: 1 PID: 6682 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 720.294290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.295219] Call Trace: [ 720.295536] dump_stack+0x107/0x167 [ 720.295945] should_fail.cold+0x5/0xa [ 720.296374] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 720.297019] should_failslab+0x5/0x20 [ 720.297446] kmem_cache_alloc+0x5b/0x360 [ 720.297904] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 720.298538] idr_get_free+0x4b5/0x8f0 [ 720.298982] idr_alloc_u32+0x170/0x2d0 [ 720.299426] ? __fprop_inc_percpu_max+0x130/0x130 [ 720.299969] ? p9_client_prepare_req.part.0+0x20a/0xb30 [ 720.300558] ? lock_release+0x6b0/0x6b0 [ 720.301013] idr_alloc+0xc2/0x130 [ 720.301399] ? idr_alloc_u32+0x2d0/0x2d0 [ 720.301850] ? rwlock_bug.part.0+0x90/0x90 [ 720.302329] p9_client_prepare_req.part.0+0x625/0xb30 [ 720.302902] ? find_held_lock+0x2c/0x110 [ 720.303353] p9_client_rpc+0x220/0x1210 [ 720.303811] ? __fget_files+0x26d/0x480 [ 720.304259] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 720.304860] ? hpet_poll+0x76/0x160 [ 720.305272] ? virtcons_probe+0xc90/0xc90 [ 720.305734] ? p9_fd_poll+0x1e0/0x2c0 [ 720.306157] ? p9_fd_create+0x357/0x4a0 [ 720.306600] ? p9_conn_create+0x510/0x510 [ 720.307053] ? p9_client_create+0x798/0x1090 [ 720.307546] ? kfree+0xd7/0x390 [ 720.307917] ? do_raw_spin_unlock+0x4f/0x220 [ 720.308420] p9_client_create+0xa76/0x1090 [ 720.308893] ? p9_client_flush+0x430/0x430 [ 720.309370] ? lockdep_init_map_type+0x2c7/0x780 [ 720.309898] ? rcu_read_lock_sched_held+0x3e/0x80 [ 720.310442] ? __raw_spin_lock_init+0x36/0x110 [ 720.310955] v9fs_session_init+0x1dd/0x16a0 [ 720.311454] ? kmem_cache_alloc_trace+0x151/0x360 [ 720.311992] ? v9fs_show_options+0x690/0x690 [ 720.312499] ? kasan_unpoison_shadow+0x33/0x50 [ 720.313008] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 720.313575] v9fs_mount+0x79/0x8f0 [ 720.313976] ? v9fs_write_inode+0x60/0x60 [ 720.314442] legacy_get_tree+0x105/0x220 [ 720.314899] vfs_get_tree+0x8e/0x300 [ 720.315318] path_mount+0x13be/0x20b0 [ 720.315749] ? strncpy_from_user+0x9e/0x470 [ 720.316229] ? finish_automount+0xa40/0xa40 [ 720.316711] ? getname_flags.part.0+0x1dd/0x4f0 [ 720.317220] ? _copy_from_user+0xfb/0x1b0 [ 720.317690] __x64_sys_mount+0x282/0x300 [ 720.318138] ? path_mount+0x20b0/0x20b0 [ 720.318579] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 720.319159] ? syscall_enter_from_user_mode+0x1d/0x50 [ 720.319743] do_syscall_64+0x33/0x40 [ 720.320151] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 720.320720] RIP: 0033:0x7f3dafdedb19 [ 720.321133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.323156] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 720.324005] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 720.324794] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 720.325590] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 720.326383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 720.327176] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:41 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 41) 18:40:41 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:41 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:41 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 720.704740] debugfs: Directory 'loop0' with parent 'block' already present! 18:40:41 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 720.781428] FAULT_INJECTION: forcing a failure. [ 720.781428] name failslab, interval 1, probability 0, space 0, times 0 [ 720.784014] CPU: 1 PID: 6696 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 720.785562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.787481] Call Trace: [ 720.788094] dump_stack+0x107/0x167 [ 720.788931] should_fail.cold+0x5/0xa [ 720.789801] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 720.791098] should_failslab+0x5/0x20 [ 720.791984] kmem_cache_alloc+0x5b/0x360 [ 720.792909] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 720.794170] idr_get_free+0x4b5/0x8f0 [ 720.795055] idr_alloc_u32+0x170/0x2d0 [ 720.795974] ? __fprop_inc_percpu_max+0x130/0x130 [ 720.797065] ? p9_client_prepare_req.part.0+0x20a/0xb30 [ 720.798269] ? lock_release+0x6b0/0x6b0 [ 720.799174] idr_alloc+0xc2/0x130 [ 720.799987] ? idr_alloc_u32+0x2d0/0x2d0 [ 720.800900] ? rwlock_bug.part.0+0x90/0x90 [ 720.801870] p9_client_prepare_req.part.0+0x625/0xb30 [ 720.803030] ? find_held_lock+0x2c/0x110 [ 720.803977] p9_client_rpc+0x220/0x1210 [ 720.804877] ? __fget_files+0x26d/0x480 [ 720.805792] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 720.807003] ? hpet_poll+0x76/0x160 [ 720.807862] ? virtcons_probe+0xc90/0xc90 [ 720.808794] ? p9_fd_poll+0x1e0/0x2c0 [ 720.809665] ? p9_fd_create+0x357/0x4a0 [ 720.810558] ? p9_conn_create+0x510/0x510 [ 720.811516] ? p9_client_create+0x798/0x1090 [ 720.812514] ? kfree+0xd7/0x390 [ 720.813269] ? do_raw_spin_unlock+0x4f/0x220 [ 720.814273] p9_client_create+0xa76/0x1090 [ 720.815248] ? p9_client_flush+0x430/0x430 [ 720.816258] ? lockdep_init_map_type+0x2c7/0x780 [ 720.817334] ? rcu_read_lock_sched_held+0x3e/0x80 [ 720.818436] ? __raw_spin_lock_init+0x36/0x110 [ 720.819511] v9fs_session_init+0x1dd/0x16a0 [ 720.820459] ? kmem_cache_alloc_trace+0x151/0x360 [ 720.821447] ? v9fs_show_options+0x690/0x690 [ 720.822382] ? kasan_unpoison_shadow+0x33/0x50 [ 720.823319] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 720.824385] v9fs_mount+0x79/0x8f0 [ 720.825120] ? v9fs_write_inode+0x60/0x60 [ 720.825962] legacy_get_tree+0x105/0x220 [ 720.826784] vfs_get_tree+0x8e/0x300 [ 720.827583] path_mount+0x13be/0x20b0 [ 720.828359] ? strncpy_from_user+0x9e/0x470 [ 720.829242] ? finish_automount+0xa40/0xa40 [ 720.830111] ? getname_flags.part.0+0x1dd/0x4f0 [ 720.831052] ? _copy_from_user+0xfb/0x1b0 [ 720.831923] __x64_sys_mount+0x282/0x300 [ 720.832763] ? path_mount+0x20b0/0x20b0 [ 720.833580] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 720.834650] ? syscall_enter_from_user_mode+0x1d/0x50 [ 720.835727] do_syscall_64+0x33/0x40 [ 720.836494] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 720.837526] RIP: 0033:0x7f3dafdedb19 [ 720.838286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.841983] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 720.843557] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 720.845017] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 720.846489] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 720.847997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 720.849466] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:41 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:41 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 42) [ 721.097247] debugfs: Directory 'loop0' with parent 'block' already present! [ 721.155779] FAULT_INJECTION: forcing a failure. [ 721.155779] name failslab, interval 1, probability 0, space 0, times 0 [ 721.158221] CPU: 1 PID: 6711 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 721.159732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 721.161524] Call Trace: [ 721.162110] dump_stack+0x107/0x167 [ 721.162903] should_fail.cold+0x5/0xa [ 721.163753] ? create_object.isra.0+0x3a/0xa20 [ 721.164752] should_failslab+0x5/0x20 [ 721.165578] kmem_cache_alloc+0x5b/0x360 [ 721.166462] create_object.isra.0+0x3a/0xa20 [ 721.167438] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 721.168544] kmem_cache_alloc+0x159/0x360 [ 721.169454] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 721.170666] idr_get_free+0x4b5/0x8f0 [ 721.171524] idr_alloc_u32+0x170/0x2d0 [ 721.172377] ? __fprop_inc_percpu_max+0x130/0x130 [ 721.173421] ? p9_client_prepare_req.part.0+0x20a/0xb30 [ 721.174577] ? lock_release+0x6b0/0x6b0 [ 721.175470] idr_alloc+0xc2/0x130 [ 721.176224] ? idr_alloc_u32+0x2d0/0x2d0 [ 721.177101] ? rwlock_bug.part.0+0x90/0x90 [ 721.178032] p9_client_prepare_req.part.0+0x625/0xb30 [ 721.179146] ? find_held_lock+0x2c/0x110 [ 721.180059] p9_client_rpc+0x220/0x1210 [ 721.180916] ? __fget_files+0x26d/0x480 [ 721.181788] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 721.182949] ? hpet_poll+0x76/0x160 [ 721.183755] ? virtcons_probe+0xc90/0xc90 [ 721.184647] ? p9_fd_poll+0x1e0/0x2c0 [ 721.185480] ? p9_fd_create+0x357/0x4a0 [ 721.186337] ? p9_conn_create+0x510/0x510 [ 721.187226] ? p9_client_create+0x798/0x1090 [ 721.188197] ? kfree+0xd7/0x390 [ 721.188910] ? do_raw_spin_unlock+0x4f/0x220 [ 721.189869] p9_client_create+0xa76/0x1090 [ 721.190793] ? p9_client_flush+0x430/0x430 [ 721.191752] ? lockdep_init_map_type+0x2c7/0x780 [ 721.192770] ? rcu_read_lock_sched_held+0x3e/0x80 [ 721.193812] ? __raw_spin_lock_init+0x36/0x110 [ 721.194808] v9fs_session_init+0x1dd/0x16a0 [ 721.195781] ? kmem_cache_alloc_trace+0x151/0x360 [ 721.196819] ? v9fs_show_options+0x690/0x690 [ 721.197792] ? kasan_unpoison_shadow+0x33/0x50 [ 721.198776] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 721.199914] v9fs_mount+0x79/0x8f0 [ 721.200685] ? v9fs_write_inode+0x60/0x60 [ 721.201578] legacy_get_tree+0x105/0x220 [ 721.202459] vfs_get_tree+0x8e/0x300 [ 721.203267] path_mount+0x13be/0x20b0 [ 721.204122] ? strncpy_from_user+0x9e/0x470 [ 721.205055] ? finish_automount+0xa40/0xa40 [ 721.205990] ? getname_flags.part.0+0x1dd/0x4f0 [ 721.206988] ? _copy_from_user+0xfb/0x1b0 [ 721.207924] __x64_sys_mount+0x282/0x300 [ 721.208802] ? path_mount+0x20b0/0x20b0 [ 721.209664] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 721.210792] ? syscall_enter_from_user_mode+0x1d/0x50 [ 721.211941] do_syscall_64+0x33/0x40 [ 721.212748] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 721.213852] RIP: 0033:0x7f3dafdedb19 [ 721.214652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 721.218617] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 721.220271] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 721.221804] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 721.223333] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 721.224898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 721.226433] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 [ 721.509451] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 721.510523] ext4 filesystem being mounted at /syzkaller-testdir550774415/syzkaller.6Wxt4r/59/file0 supports timestamps until 2038 (0x7fffffff) [ 721.647300] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 721.647516] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 721.648788] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/56/file0 supports timestamps until 2038 (0x7fffffff) [ 721.657809] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/50/file0 supports timestamps until 2038 (0x7fffffff) 18:40:54 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:54 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) 18:40:54 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:54 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:40:54 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 43) 18:40:54 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:54 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:54 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 733.692842] FAULT_INJECTION: forcing a failure. [ 733.692842] name failslab, interval 1, probability 0, space 0, times 0 [ 733.694981] CPU: 0 PID: 6744 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 733.696294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.697889] Call Trace: [ 733.698411] dump_stack+0x107/0x167 [ 733.699117] should_fail.cold+0x5/0xa [ 733.699877] ? create_object.isra.0+0x3a/0xa20 [ 733.700760] should_failslab+0x5/0x20 [ 733.701507] kmem_cache_alloc+0x5b/0x360 [ 733.702303] create_object.isra.0+0x3a/0xa20 [ 733.703139] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 733.704115] kmem_cache_alloc+0x159/0x360 [ 733.704916] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 733.705988] idr_get_free+0x4b5/0x8f0 [ 733.706742] idr_alloc_u32+0x170/0x2d0 [ 733.707495] ? __fprop_inc_percpu_max+0x130/0x130 [ 733.708428] ? p9_client_prepare_req.part.0+0x20a/0xb30 [ 733.709455] ? lock_release+0x6b0/0x6b0 [ 733.710224] idr_alloc+0xc2/0x130 [ 733.710890] ? idr_alloc_u32+0x2d0/0x2d0 [ 733.711676] ? rwlock_bug.part.0+0x90/0x90 [ 733.712499] p9_client_prepare_req.part.0+0x625/0xb30 [ 733.713482] ? find_held_lock+0x2c/0x110 [ 733.714262] p9_client_rpc+0x220/0x1210 [ 733.715018] ? __fget_files+0x26d/0x480 [ 733.715807] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 733.716831] ? hpet_poll+0x76/0x160 [ 733.717526] ? virtcons_probe+0xc90/0xc90 [ 733.718316] ? p9_fd_poll+0x1e0/0x2c0 [ 733.719053] ? p9_fd_create+0x357/0x4a0 [ 733.719817] ? p9_conn_create+0x510/0x510 [ 733.720605] ? p9_client_create+0x798/0x1090 [ 733.721443] ? kfree+0xd7/0x390 [ 733.722074] ? do_raw_spin_unlock+0x4f/0x220 [ 733.722922] p9_client_create+0xa76/0x1090 [ 733.723748] ? p9_client_flush+0x430/0x430 [ 733.724567] ? lockdep_init_map_type+0x2c7/0x780 [ 733.725476] ? rcu_read_lock_sched_held+0x3e/0x80 [ 733.726415] ? __raw_spin_lock_init+0x36/0x110 [ 733.727306] v9fs_session_init+0x1dd/0x16a0 [ 733.728172] ? kmem_cache_alloc_trace+0x151/0x360 [ 733.729102] ? v9fs_show_options+0x690/0x690 [ 733.729975] ? kasan_unpoison_shadow+0x33/0x50 [ 733.730860] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 733.731862] v9fs_mount+0x79/0x8f0 [ 733.732552] ? v9fs_write_inode+0x60/0x60 [ 733.733352] legacy_get_tree+0x105/0x220 [ 733.734141] vfs_get_tree+0x8e/0x300 [ 733.734862] path_mount+0x13be/0x20b0 [ 733.735614] ? strncpy_from_user+0x9e/0x470 [ 733.736447] ? finish_automount+0xa40/0xa40 [ 733.737281] ? getname_flags.part.0+0x1dd/0x4f0 [ 733.738173] ? _copy_from_user+0xfb/0x1b0 [ 733.738986] __x64_sys_mount+0x282/0x300 [ 733.739776] ? path_mount+0x20b0/0x20b0 [ 733.740546] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 733.741557] ? syscall_enter_from_user_mode+0x1d/0x50 [ 733.742562] do_syscall_64+0x33/0x40 [ 733.743285] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 733.744294] RIP: 0033:0x7f3dafdedb19 [ 733.745016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.748571] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 733.750045] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 733.751422] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 733.752807] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 733.754183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.755573] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:54 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 44) [ 733.874682] FAULT_INJECTION: forcing a failure. [ 733.874682] name failslab, interval 1, probability 0, space 0, times 0 [ 733.877059] CPU: 1 PID: 6764 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 733.878478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 733.880216] Call Trace: [ 733.880767] dump_stack+0x107/0x167 [ 733.881538] should_fail.cold+0x5/0xa [ 733.882344] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 733.883566] should_failslab+0x5/0x20 [ 733.884356] kmem_cache_alloc+0x5b/0x360 [ 733.885208] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 733.886372] idr_get_free+0x4b5/0x8f0 [ 733.887185] idr_alloc_u32+0x170/0x2d0 [ 733.888004] ? __fprop_inc_percpu_max+0x130/0x130 [ 733.888999] ? p9_client_prepare_req.part.0+0x20a/0xb30 [ 733.890107] ? lock_release+0x6b0/0x6b0 [ 733.890932] idr_alloc+0xc2/0x130 [ 733.891696] ? idr_alloc_u32+0x2d0/0x2d0 [ 733.892535] ? rwlock_bug.part.0+0x90/0x90 [ 733.893421] p9_client_prepare_req.part.0+0x625/0xb30 [ 733.894477] ? find_held_lock+0x2c/0x110 [ 733.895336] p9_client_rpc+0x220/0x1210 [ 733.896162] ? __fget_files+0x26d/0x480 [ 733.896981] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 733.898083] ? hpet_poll+0x76/0x160 [ 733.898920] ? virtcons_probe+0xc90/0xc90 [ 733.899986] ? p9_fd_poll+0x1e0/0x2c0 [ 733.900930] ? p9_fd_create+0x357/0x4a0 [ 733.901903] ? p9_conn_create+0x510/0x510 [ 733.902911] ? p9_client_create+0x798/0x1090 [ 733.904007] ? kfree+0xd7/0x390 [ 733.904814] ? do_raw_spin_unlock+0x4f/0x220 [ 733.905897] p9_client_create+0xa76/0x1090 [ 733.906941] ? p9_client_flush+0x430/0x430 [ 733.907995] ? lockdep_init_map_type+0x2c7/0x780 [ 733.909142] ? rcu_read_lock_sched_held+0x3e/0x80 [ 733.910330] ? __raw_spin_lock_init+0x36/0x110 [ 733.911457] v9fs_session_init+0x1dd/0x16a0 [ 733.912552] ? kmem_cache_alloc_trace+0x151/0x360 [ 733.913729] ? v9fs_show_options+0x690/0x690 [ 733.914847] ? kasan_unpoison_shadow+0x33/0x50 [ 733.915815] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 733.916861] v9fs_mount+0x79/0x8f0 [ 733.917601] ? v9fs_write_inode+0x60/0x60 [ 733.918471] legacy_get_tree+0x105/0x220 [ 733.919319] vfs_get_tree+0x8e/0x300 [ 733.920099] path_mount+0x13be/0x20b0 [ 733.920892] ? strncpy_from_user+0x9e/0x470 [ 733.921799] ? finish_automount+0xa40/0xa40 [ 733.922696] ? getname_flags.part.0+0x1dd/0x4f0 [ 733.923668] ? _copy_from_user+0xfb/0x1b0 [ 733.924541] __x64_sys_mount+0x282/0x300 [ 733.925379] ? path_mount+0x20b0/0x20b0 [ 733.926223] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 733.927301] ? syscall_enter_from_user_mode+0x1d/0x50 [ 733.928378] do_syscall_64+0x33/0x40 [ 733.929151] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 733.930204] RIP: 0033:0x7f3dafdedb19 [ 733.930961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 733.934723] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 733.936322] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 733.937774] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 733.939245] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 733.940712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.942168] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:40:54 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 45) [ 734.241548] debugfs: Directory 'loop0' with parent 'block' already present! 18:40:54 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:40:54 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) getpid() 18:40:54 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 734.501752] debugfs: Directory 'loop0' with parent 'block' already present! [ 734.534655] EXT4-fs warning (device loop5): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop5. 18:40:55 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 734.551950] EXT4-fs warning (device loop7): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop7. [ 734.554753] EXT4-fs warning (device loop4): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop4. [ 734.628105] FAULT_INJECTION: forcing a failure. [ 734.628105] name failslab, interval 1, probability 0, space 0, times 0 [ 734.629827] CPU: 0 PID: 6786 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 734.630874] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 734.632144] Call Trace: [ 734.632549] dump_stack+0x107/0x167 [ 734.633102] should_fail.cold+0x5/0xa [ 734.633685] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 734.634547] should_failslab+0x5/0x20 [ 734.635135] kmem_cache_alloc+0x5b/0x360 [ 734.635770] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 734.636618] idr_get_free+0x4b5/0x8f0 [ 734.637216] idr_alloc_u32+0x170/0x2d0 [ 734.637813] ? __fprop_inc_percpu_max+0x130/0x130 [ 734.638541] ? p9_client_prepare_req.part.0+0x20a/0xb30 [ 734.639380] ? lock_release+0x6b0/0x6b0 [ 734.640052] idr_alloc+0xc2/0x130 [ 734.640616] ? idr_alloc_u32+0x2d0/0x2d0 [ 734.641285] ? rwlock_bug.part.0+0x90/0x90 [ 734.641985] p9_client_prepare_req.part.0+0x625/0xb30 [ 734.642791] ? find_held_lock+0x2c/0x110 [ 734.643427] p9_client_rpc+0x220/0x1210 [ 734.644043] ? __fget_files+0x26d/0x480 [ 734.644673] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 734.645503] ? hpet_poll+0x76/0x160 [ 734.646064] ? virtcons_probe+0xc90/0xc90 [ 734.646703] ? p9_fd_poll+0x1e0/0x2c0 [ 734.647304] ? p9_fd_create+0x357/0x4a0 [ 734.647933] ? p9_conn_create+0x510/0x510 [ 734.648588] ? p9_client_create+0x798/0x1090 [ 734.649278] ? kfree+0xd7/0x390 [ 734.649801] ? do_raw_spin_unlock+0x4f/0x220 [ 734.650523] p9_client_create+0xa76/0x1090 [ 734.651216] ? p9_client_flush+0x430/0x430 [ 734.651907] ? lockdep_init_map_type+0x2c7/0x780 [ 734.652627] ? rcu_read_lock_sched_held+0x3e/0x80 [ 734.653411] ? __raw_spin_lock_init+0x36/0x110 [ 734.654174] v9fs_session_init+0x1dd/0x16a0 [ 734.654884] ? kmem_cache_alloc_trace+0x151/0x360 [ 734.655665] ? v9fs_show_options+0x690/0x690 [ 734.656396] ? kasan_unpoison_shadow+0x33/0x50 [ 734.657109] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 734.657923] v9fs_mount+0x79/0x8f0 [ 734.658484] ? v9fs_write_inode+0x60/0x60 [ 734.659148] legacy_get_tree+0x105/0x220 [ 734.659812] vfs_get_tree+0x8e/0x300 [ 734.660411] path_mount+0x13be/0x20b0 [ 734.661036] ? strncpy_from_user+0x9e/0x470 [ 734.661737] ? finish_automount+0xa40/0xa40 [ 734.662408] ? getname_flags.part.0+0x1dd/0x4f0 [ 734.663159] ? _copy_from_user+0xfb/0x1b0 [ 734.663855] __x64_sys_mount+0x282/0x300 [ 734.664505] ? path_mount+0x20b0/0x20b0 [ 734.665149] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 734.665995] ? syscall_enter_from_user_mode+0x1d/0x50 [ 734.666834] do_syscall_64+0x33/0x40 [ 734.667439] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 734.668284] RIP: 0033:0x7f3dafdedb19 [ 734.668877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 734.671896] RSP: 002b:00007f3dad363188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 734.673134] RAX: ffffffffffffffda RBX: 00007f3daff00f60 RCX: 00007f3dafdedb19 [ 734.674287] RDX: 0000000020000280 RSI: 0000000020000040 RDI: 0000000000000000 [ 734.675435] RBP: 00007f3dad3631d0 R08: 0000000020000100 R09: 0000000000000000 [ 734.676603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 734.677753] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:41:12 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 751.574388] FAULT_INJECTION: forcing a failure. [ 751.574388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 751.576002] CPU: 1 PID: 6807 Comm: syz-executor.0 Not tainted 5.10.156 #1 [ 751.576784] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 751.577728] Call Trace: [ 751.578036] dump_stack+0x107/0x167 [ 751.578455] should_fail.cold+0x5/0xa [ 751.578893] _copy_to_user+0x2e/0x180 [ 751.579550] simple_read_from_buffer+0xcc/0x160 [ 751.580122] proc_fail_nth_read+0x198/0x230 [ 751.580747] ? proc_sessionid_read+0x230/0x230 [ 751.581280] ? security_file_permission+0x24e/0x570 [ 751.581849] ? perf_trace_initcall_start+0x101/0x380 [ 751.582437] ? proc_sessionid_read+0x230/0x230 [ 751.582969] vfs_read+0x228/0x580 [ 751.583372] ksys_read+0x12d/0x260 [ 751.583793] ? __ia32_sys_pwrite64+0x230/0x230 [ 751.584328] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 751.584940] ? syscall_enter_from_user_mode+0x1d/0x50 [ 751.585540] do_syscall_64+0x33/0x40 [ 751.585976] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 751.586565] RIP: 0033:0x7f3dafda069c [ 751.586990] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 751.589113] RSP: 002b:00007f3dad363170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 751.589985] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f3dafda069c [ 751.590809] RDX: 000000000000000f RSI: 00007f3dad3631e0 RDI: 0000000000000005 [ 751.591629] RBP: 00007f3dad3631d0 R08: 0000000000000000 R09: 0000000000000000 [ 751.592453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 751.593262] R13: 00007ffd871ed9ef R14: 00007f3dad363300 R15: 0000000000022000 18:41:12 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:12 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:41:12 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 46) 18:41:12 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:12 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:12 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) getpid() 18:41:12 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:12 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 751.905238] debugfs: Directory 'loop0' with parent 'block' already present! [ 751.977115] debugfs: Directory 'loop0' with parent 'block' already present! [ 752.064208] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 752.075413] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/52/file0 supports timestamps until 2038 (0x7fffffff) [ 752.088156] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 752.095398] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/58/file0 supports timestamps until 2038 (0x7fffffff) 18:41:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:24 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:24 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:24 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:24 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:41:24 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:41:24 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) getpid() 18:41:24 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:41:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x7, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x8, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x9, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xa, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xb, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x10, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x700, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 765.043960] EXT4-fs warning (device loop5): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop5. 18:41:25 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:41:25 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:41:25 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:25 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:25 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:41:25 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:25 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:41:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x900, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xa00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xb00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x1020, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:25 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x2000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:26 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x2010, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:26 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() [ 765.943254] debugfs: Directory 'loop0' with parent 'block' already present! [ 766.367973] EXT4-fs warning (device loop4): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop4. [ 766.718339] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 766.724583] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/60/file0 supports timestamps until 2038 (0x7fffffff) 18:41:41 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x3f00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:41 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:41:41 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:41 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:41:41 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:41:41 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:41:41 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:41 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:41 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xedc0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:41 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:42 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x80000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:42 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:42 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xfeffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:42 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x1000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:42 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:42 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x2000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:42 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:41:42 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) [ 782.279683] debugfs: Directory 'loop0' with parent 'block' already present! 18:41:55 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:55 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:55 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:41:55 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:41:55 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:41:55 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) 18:41:55 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:55 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x7000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:55 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x8000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 794.995914] debugfs: Directory 'loop0' with parent 'block' already present! 18:41:55 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:41:55 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:41:55 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) 18:41:55 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:41:55 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() [ 795.142452] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 795.145878] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 795.149815] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/62/file0 supports timestamps until 2038 (0x7fffffff) [ 795.153031] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/56/file0 supports timestamps until 2038 (0x7fffffff) 18:41:55 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x9000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:41:55 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xa000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:09 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:42:09 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:42:09 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xb000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:09 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:09 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:42:09 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:09 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:09 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:42:09 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x10000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:09 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:09 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x20100000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:09 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x3f000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:09 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:10 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() [ 809.400794] EXT4-fs warning (device loop4): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop4. 18:42:10 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 810.155548] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 810.159219] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/64/file0 supports timestamps until 2038 (0x7fffffff) 18:42:24 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:42:24 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:24 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:24 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) 18:42:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x8cffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:24 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:42:24 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:24 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:42:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xc0ed0000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xf6ffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:24 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xfeffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xffff0000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xfffffe00, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xffffff7f, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:24 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xffffff8c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 824.018825] debugfs: Directory 'loop0' with parent 'block' already present! 18:42:24 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) getpid() [ 824.169806] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 824.172173] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/65/file0 supports timestamps until 2038 (0x7fffffff) [ 824.344354] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 824.352033] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/58/file0 supports timestamps until 2038 (0x7fffffff) 18:42:39 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:42:39 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) 18:42:39 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:42:39 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:39 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xfffffff6, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:39 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:42:39 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:39 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:39 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xfffffffe, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:39 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:39 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xedc000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:39 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x1000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:39 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x8000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:40 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xfeffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:40 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x100000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:40 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 839.975372] debugfs: Directory 'loop0' with parent 'block' already present! [ 840.019053] debugfs: Directory 'loop0' with parent 'block' already present! [ 840.070260] EXT4-fs warning (device loop4): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop4. 18:42:54 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) getpid() 18:42:54 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:42:54 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x200000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:42:54 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:42:54 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:54 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) 18:42:54 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:54 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:42:55 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x700000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 855.002475] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 855.003500] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/60/file0 supports timestamps until 2038 (0x7fffffff) [ 855.017356] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 855.019446] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/67/file0 supports timestamps until 2038 (0x7fffffff) 18:43:07 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) getpid() 18:43:07 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:07 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:07 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:43:07 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x800000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:07 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:07 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:43:07 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:43:07 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x900000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:07 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xa00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:07 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) getpid() 18:43:08 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:43:08 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:43:08 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xb00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:08 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 867.557764] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 867.558780] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/68/file0 supports timestamps until 2038 (0x7fffffff) [ 867.617363] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 867.621827] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/61/file0 supports timestamps until 2038 (0x7fffffff) 18:43:21 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:43:21 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:43:21 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:21 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:21 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:43:21 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x1000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:21 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:43:21 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:21 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x2000000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 881.086731] debugfs: Directory 'loop0' with parent 'block' already present! [ 881.171693] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 881.172018] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 881.173186] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/69/file0 supports timestamps until 2038 (0x7fffffff) [ 881.175196] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/62/file0 supports timestamps until 2038 (0x7fffffff) 18:43:34 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:43:34 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x2010000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:34 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:34 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:35 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:43:35 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:35 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:43:35 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:43:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x3f00000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xf6ffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xfeffffff00000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xffff000000000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:35 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:43:35 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 895.095115] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 895.097313] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/70/file0 supports timestamps until 2038 (0x7fffffff) [ 895.111108] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 895.113274] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/63/file0 supports timestamps until 2038 (0x7fffffff) 18:43:35 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:43:35 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:43:35 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:43:35 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:35 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0xffffff7f00000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:35 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x2, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 895.672453] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 895.673999] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/71/file0 supports timestamps until 2038 (0x7fffffff) [ 896.008169] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 896.010142] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/64/file0 supports timestamps until 2038 (0x7fffffff) 18:43:49 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:49 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) getpid() 18:43:49 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:49 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x7, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:49 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:43:49 executing program 1: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:43:49 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:43:49 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:43:49 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x8, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:49 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x9, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:43:49 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() [ 909.762651] debugfs: Directory 'loop0' with parent 'block' already present! 18:44:02 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xa, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:02 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:44:02 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) getpid() 18:44:02 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:02 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:44:02 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:44:02 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:02 executing program 1: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xb, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x10, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x700, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x900, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 922.967099] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:44:03 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) getpid() 18:44:03 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() [ 922.973229] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/73/file0 supports timestamps until 2038 (0x7fffffff) [ 922.973895] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 922.980047] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/66/file0 supports timestamps until 2038 (0x7fffffff) 18:44:03 executing program 1: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:03 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:44:03 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:44:03 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:03 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xa00, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xb00, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:03 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x1020, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x2000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x2010, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x3f00, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:04 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xedc0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 923.874148] debugfs: Directory 'loop0' with parent 'block' already present! [ 924.542506] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 924.545536] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/67/file0 supports timestamps until 2038 (0x7fffffff) [ 924.800050] EXT4-fs warning (device loop5): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop5. 18:44:20 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:20 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:20 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:20 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:44:20 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:44:20 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:44:20 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x80000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:20 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:44:20 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xfeffff, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:20 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x1000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:20 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x2000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:33 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x7000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:33 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:44:33 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:44:33 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:33 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:33 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:44:33 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:33 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:44:33 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x8000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 953.140363] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 953.143471] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/69/file0 supports timestamps until 2038 (0x7fffffff) [ 953.319181] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 953.321625] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/76/file0 supports timestamps until 2038 (0x7fffffff) 18:44:46 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:44:46 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x9000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:46 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:46 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:44:46 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:44:46 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:46 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:46 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:44:46 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xa000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xb000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x10000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x20000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x20100000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x3f000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 966.980446] debugfs: Directory 'loop0' with parent 'block' already present! [ 967.075198] EXT4-fs warning (device loop5): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop5. [ 967.080574] EXT4-fs: error -4 creating inode table initialization thread [ 967.082320] EXT4-fs (loop4): mount failed 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x8cffffff, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:47 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:47 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:44:47 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:44:47 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xc0ed0000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xf6ffffff, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xfeffffff, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:44:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xffff0000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 967.558164] debugfs: Directory 'loop0' with parent 'block' already present! 18:44:48 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:44:48 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 967.762338] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 967.765199] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/71/file0 supports timestamps until 2038 (0x7fffffff) [ 967.784253] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 967.785934] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/78/file0 supports timestamps until 2038 (0x7fffffff) 18:45:03 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:45:03 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:03 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:45:03 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:45:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xfffffe00, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:03 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:03 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:03 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:45:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xffffff7f, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:03 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:45:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xffffff8c, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:03 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:45:03 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xfffffff6, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 983.816043] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 983.819568] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/72/file0 supports timestamps until 2038 (0x7fffffff) [ 983.967552] EXT4-fs warning (device loop5): ext4_multi_mount_protect:384: Unable to create kmmpd thread for loop5. 18:45:18 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) getpid() 18:45:18 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:45:18 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:18 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xfffffffe, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:18 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:45:18 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:18 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:45:18 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:18 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xedc000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:18 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) getpid() 18:45:19 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 998.899799] debugfs: Directory 'loop0' with parent 'block' already present! [ 998.991282] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 998.992925] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 998.993298] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/80/file0 supports timestamps until 2038 (0x7fffffff) [ 999.028949] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/73/file0 supports timestamps until 2038 (0x7fffffff) 18:45:33 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:45:33 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:45:33 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r2, 0x5) getpid() 18:45:33 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:45:33 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:33 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:33 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x1000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:33 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 1012.741160] perf: interrupt took too long (2560 > 2500), lowering kernel.perf_event_max_sample_rate to 78000 18:45:33 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x8000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:33 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xfeffff00000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:33 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:45:33 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x100000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1013.378191] debugfs: Directory 'loop0' with parent 'block' already present! [ 1013.495921] EXT4-fs: error -4 creating inode table initialization thread [ 1013.498422] EXT4-fs (loop5): mount failed [ 1013.523300] EXT4-fs: error -4 creating inode table initialization thread [ 1013.525132] EXT4-fs (loop4): mount failed 18:45:47 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:45:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x200000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:47 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:45:47 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:45:47 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:47 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:45:47 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:47 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x700000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x800000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x900000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:47 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xa00000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:48 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:45:48 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:48 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:45:48 executing program 2: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 1027.472217] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1027.474206] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/82/file0 supports timestamps until 2038 (0x7fffffff) 18:45:48 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 1027.524094] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1027.525633] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/75/file0 supports timestamps until 2038 (0x7fffffff) 18:45:48 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:48 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:48 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xb00000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:48 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:45:48 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x1000000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:48 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x2000000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:48 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x2010000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:48 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x3f00000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:45:48 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x8cffffff00000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1027.968311] debugfs: Directory 'loop0' with parent 'block' already present! 18:45:48 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:45:48 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) getpid() [ 1028.409648] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1028.413551] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/76/file0 supports timestamps until 2038 (0x7fffffff) 18:46:01 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:46:01 executing program 2: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:01 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:01 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:46:01 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xf6ffffff00000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:46:01 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:01 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) getpid() 18:46:01 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:01 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:01 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:46:01 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xfeffffff00000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:46:01 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, r2, 0x5) getpid() 18:46:01 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xffff000000000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:46:01 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0xffffff7f00000000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:46:01 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x22, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1041.235648] 9pnet: Insufficient options for proto=fd [ 1041.240324] 9pnet: Insufficient options for proto=fd 18:46:01 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x2c, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:46:01 executing program 2: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 1041.316582] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1041.317776] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/84/file0 supports timestamps until 2038 (0x7fffffff) [ 1041.394465] debugfs: Directory 'loop0' with parent 'block' already present! [ 1041.436972] 9pnet: Insufficient options for proto=fd [ 1041.455890] 9pnet: Insufficient options for proto=fd [ 1041.476206] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1041.482187] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/77/file0 supports timestamps until 2038 (0x7fffffff) [ 1053.084992] 9pnet: Insufficient options for proto=fd [ 1053.086480] 9pnet: Insufficient options for proto=fd 18:46:13 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:13 executing program 6: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:46:13 executing program 4: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:13 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:13 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:46:13 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:13 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x22, {'wfdno', 0x3d, r1}}) 18:46:13 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:46:13 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x22, r1}}) 18:46:13 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() [ 1053.152357] 9pnet: Insufficient options for proto=fd [ 1053.157195] 9pnet: Insufficient options for proto=fd 18:46:13 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x2c, r1}}) 18:46:13 executing program 6: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() [ 1053.252323] debugfs: Directory 'loop0' with parent 'block' already present! [ 1053.301644] 9pnet: Insufficient options for proto=fd [ 1053.304457] 9pnet: Insufficient options for proto=fd 18:46:13 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:46:13 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:13 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x22}) 18:46:13 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() [ 1053.385517] 9pnet: Insufficient options for proto=fd [ 1053.395330] 9pnet: Insufficient options for proto=fd 18:46:14 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1053.489312] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1053.491542] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/85/file0 supports timestamps until 2038 (0x7fffffff) 18:46:14 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() [ 1053.571922] debugfs: Directory 'loop0' with parent 'block' already present! [ 1053.723215] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1053.732456] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/78/file0 supports timestamps until 2038 (0x7fffffff) 18:46:28 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:28 executing program 4: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:28 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:28 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:28 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, r2, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, r2, 0x5) getpid() 18:46:28 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:46:28 executing program 6: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:46:28 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x2}}) 18:46:28 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x7}}) 18:46:28 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:46:28 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:28 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x8}}) 18:46:28 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x9}}) 18:46:28 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0xa}}) 18:46:28 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:46:28 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 1068.092120] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1068.093919] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/79/file0 supports timestamps until 2038 (0x7fffffff) [ 1068.095341] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1068.124408] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/86/file0 supports timestamps until 2038 (0x7fffffff) 18:46:44 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:44 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:44 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:44 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0xb}}) 18:46:44 executing program 4: sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:44 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:46:44 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:46:44 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:44 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x10}}) 18:46:44 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x47e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:46:44 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="bf0148153b27213f8219fceebad3d6932e885c06c15bd5d6a245a9d6156a18946134c4081577c354fd188711a06023544054b4ecde61076d951bbc98c7fd3f1e888c38f30cce774aef6d8faa1b6c1addbab189b09eb6242adf2292a547c13e9a89925ea62b85415b73c1aa1570f3fb1044dd8a438325777d80f588f416deb335108fc342f1bac59a71059703c568"]) sendfile(r1, r0, &(0x7f0000000000), 0x30) [ 1083.807105] 9pnet: Insufficient options for proto=fd [ 1083.809317] 9pnet: Insufficient options for proto=fd 18:46:44 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7472616e733d666496e91171584f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="ee73"]) 18:46:44 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) sendfile(r1, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:46:44 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 1083.904114] 9pnet: Could not find request transport: fd–éqXO=0x0000000000000003 [ 1083.915082] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1083.916186] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/87/file0 supports timestamps until 2038 (0x7fffffff) [ 1083.928834] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1083.930983] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/80/file0 supports timestamps until 2038 (0x7fffffff) [ 1083.933433] 9pnet: Could not find request transport: fd–éqXO=0x0000000000000003 18:46:44 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:46:44 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:58 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:46:58 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:58 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:58 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:58 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$AUTOFS_IOC_CATATONIC(r0, 0x9362, 0x0) 18:46:58 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:58 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:46:58 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:46:58 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7452616e733d66642c7266646e6f3dc29abe0b8b63b3aa1d6c0100c66f0d4d876231f915e05cdf92795ca58d1426289b49ab99c82686989915e477706022bbb4d78ac293616d48f055f984822c8c9c046620d03a563280215e1fc929b9c049536b10e4843e9ed4933526c55742f98774b3891c4ed5cb168b0cf813ea1cfe4763ed5a94249f1627e69c", @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d0f72748bfd4587c3e27e0701646cca0cef4386032cdb3771592280a4c09acfbfd1368629d472fea58fd4e3bb", @ANYRESHEX=r1, @ANYBLOB=',\x00']) 18:46:58 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$FIOCLEX(r0, 0x5451) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3da3b91573d0936cd4bf82a654e8ccd1bbcef021d9c2f892ec0e6a6f97c64bc9ae8dda6d8411", @ANYRESHEX=r1, @ANYBLOB="7ebb85f309d4773e4aacbc1bfa6bad302dabf11d5f05f5f140403a42fc59706478f3acbceddf729eaf0103cd62cc3dc724117100820e7200c1d4bb3535c76feadaeb48cf5f5ba1c195522c23813d40950b5d5f5804cf283d76bfb82755af121daf4f51"]) [ 1098.007031] 9pnet: Insufficient options for proto=fd 18:46:58 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000e00000000000000", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB]) r2 = timerfd_create(0x5, 0x800) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 18:46:58 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:46:58 executing program 0: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140), 0x1, 0x3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:46:58 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:46:58 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) [ 1098.141593] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1098.143257] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1098.144338] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/88/file0 supports timestamps until 2038 (0x7fffffff) [ 1098.147252] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/81/file0 supports timestamps until 2038 (0x7fffffff) [ 1098.222527] perf: interrupt took too long (3223 > 3200), lowering kernel.perf_event_max_sample_rate to 62000 [ 1098.273426] perf: interrupt took too long (4053 > 4028), lowering kernel.perf_event_max_sample_rate to 49000 18:47:12 executing program 6: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) getpid() 18:47:12 executing program 1: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) sendfile(0xffffffffffffffff, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:47:12 executing program 2: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:47:12 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:47:12 executing program 3: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r4, r3, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, r3, 0x5) getpid() 18:47:12 executing program 5: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/177, 0xb1) 18:47:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000016140), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r4, &(0x7f0000016580)={0x0, 0x0, &(0x7f0000016540)={&(0x7f0000000200)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x5}]}, 0x1c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r5 = openat$incfs(r1, &(0x7f0000000000)='.log\x00', 0x410200, 0x1cc) pwrite64(r2, &(0x7f00000002c0)="348d6faa325204dd0c05e71eaa4a2e8ffd067c16d629a9d1e7012671ef73e84804f0f8f3eaddf7f4da34b5776d84c3c197eca378e6502a6a2a280de81087263369319063967629c392d7d4da2556b621acdef27bf840", 0x56, 0x1f) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r5, 0x6628) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e20, 0x40, @remote, 0x7f}}, 0x0, 0x0, 0x17, 0x0, "ee8ba2e9de31749080aa720bdc0c3bbcafa3c9fe58a1425fa3ecb13b0ce2cc760a0c129f3f0061e21dfc6336b9905ac3d482a54315f64c0be45eafbb3a333bf2f7ba77a865dcdfb6f7277f8a68c1535b"}, 0xd8) 18:47:12 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = getpgid(0x0) move_pages(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r0, 0x4, 0xffffffffffffffff, 0x5) getpid() 18:47:12 executing program 7: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) move_pages(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(r2, r0, &(0x7f00000006c0)=0xebb, 0xc87) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="2f29350864172c4409e4163a6b6818ecd79802dc6f896d83e27cd67ebdc773b534fec4875c3da3b63bd5e255e09ac5ae307a74866e4ad341b3f0db40b3c6156eb7f468ba11ed1b1ed1acd59bc637fd635f194def8ed554fbc6d9ff98f1d69c8ec2d3b1319ee06d952958c3573c550aa3961f", 0x72}, {&(0x7f00000004c0)="2a5fc66194db100630df9a2d4882d79922bb6127470b86ddd86a57592b90a6caf22eef1ad5bc1b66e6a20f4c359a7965d4ffa53a666cfd79b6393c7162f4c32b9daa42f4815b99edad80ea61ad8bf11ec61f73dc20996e884ed2a690ab81cd7702c172116e5090aae19488f1f0b4047fd0f8cd2113", 0x75}, {&(0x7f00000001c0)="c224a14a17875d857e62303f693a070d220e9f78cc438a3b03ded1547a1c619fe9da964781a69f5bd81d7c3ae05e", 0x2e}, {&(0x7f0000000380)="a1b5a8448d6c10957f4f08245327385be39cb32b7ea4cb24649fb73f3ce59f7ef42596e0", 0x24}, {&(0x7f0000000540)="64333673828c5fabdd0f9b2ea46d6df2d79cfd8bd48a8594db84f9c600e9b6f43d886eea013a74e6dc3237560a1f93bb2cc9ece1f713a4bc252aad868e39a7493141f439117edd8d89d81045dc455c8c3b301de2168cada649a272c9ade570ce7a4ac12957a9c8ddcbf85e20de64b7e978af3e22ad20ddd1f5e60fe0b60a57beedc059b7f26f3c62f6ac2a6f6f80e6f14fcdaf9cb90b520bf34908768ccc8696309b6135b0a838e39d433ca8acf36c28d145dd5c942749e40f983fbea4c51e2552", 0xc1}], 0x5, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x80000001) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x8, 0xf8, 0x4, 0xd1, 0x0, 0x1000, 0x808, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8001, 0x62dc}, 0x200, 0x7, 0x0, 0x5, 0x800, 0x81, 0x1ff, 0x0, 0x9}, r1, 0x4, 0xffffffffffffffff, 0x5) getpid() [ 1111.782205] debugfs: Directory 'loop0' with parent 'block' already present! [ 1111.882447] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1111.890887] ext4 filesystem being mounted at /syzkaller-testdir682332322/syzkaller.fLqC5w/82/file0 supports timestamps until 2038 (0x7fffffff) [ 1111.893905] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1111.900379] ext4 filesystem being mounted at /syzkaller-testdir625203755/syzkaller.RrUVNk/89/file0 supports timestamps until 2038 (0x7fffffff) VM DIAGNOSIS: 18:52:14 Registers: info registers vcpu 0 RAX=ffffffff83e1f7f0 RBX=ffffffff84e322c0 RCX=ffffffff83e0753c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1fbb3 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670cc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1f7fe RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055715a3ee678 CR3=000000000cba4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004170352d00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e1f7f0 RBX=ffff88800852b300 RCX=ffffffff83e0753c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1fbb3 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670cc8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1f7fe RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc0f5d2a010 CR3=000000000cba4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000d02fe016c6c6f502e726567616e61 XMM02=006e65672063657865080a0100010101 XMM03=636578650b007a7a7566206365786509 XMM04=696d20636578650d0065676169727420 XMM05=65657320636578650a00657a696d696e XMM06=11006c61746f7420636578650a007364 XMM07=7472617473657220726f747563657865 XMM08=007a7a7566206365786509006e656720 XMM09=78650d0065676169727420636578650b XMM10=6578650a00657a696d696e696d206365 XMM11=6f7420636578650a0073646565732063 XMM12=657220726f74756365786511006c6174 XMM13=6e616320636578650e00737472617473 XMM14=616d7320636578650a00657461646964 XMM15=000073746e696820636578650a006873