xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) 02:40:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x3) 02:40:59 executing program 2: creat(0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x28, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = syz_io_uring_setup(0x457e, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x1, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000180)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x59f5ee0a7c70a1ba, 0x0, @fd=r1, 0x3, 0x0, 0x1, 0x0, 0x1, {0x0, r5}}, 0xbd53) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r0, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r4}}, 0x7) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x59f5ee0a7c70a1ba, 0x0, @fd, 0x3, 0x0, 0x1, 0x0, 0x1, {0x0, r7}}, 0xbd53) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r8, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd, 0x2, 0x1ee, 0x5, 0x4}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)={0x652000, 0x2, 0x2}, &(0x7f0000000340)='./file0\x00', 0x18, 0x0, 0x23456}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x7, &(0x7f0000000040)={0x77359400}, 0x1, 0x1, 0x1, {0x0, r4}}, 0x5) socket$inet6_udp(0xa, 0x2, 0x0) migrate_pages(0x0, 0x4, &(0x7f0000000200)=0x7a52b9a7, &(0x7f0000000240)=0x1) 02:40:59 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414bb, {0x2, 0x0, @broadcast}}) fallocate(r1, 0x1d, 0xfffffffffffffffe, 0xb35c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) 02:40:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x3) 02:40:59 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) syz_io_uring_setup(0x457f, 0x0, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000001740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000015c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002dbd7000fedbdf25110000000a000900aaaaaaaaaabb000008000600", @ANYRES32=0x0, @ANYBLOB="9aaa9ac42399d736a6f09c07e37bfa6804b4e07400f298f6a0d03dcd7316f31296e26d2ed10bc8e9b73bf6eb2587db64c2367581a360d618"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48090) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) 02:40:59 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) fsetxattr$security_evm(r1, &(0x7f0000000000), &(0x7f0000000040)=@v2={0x5, 0x3, 0xd, 0x166, 0xed, "7ed1943a9c1855c27dcb238bac2b529eaa169b99a931a71e4029619908e94fddec825a124a184aa36969362c298685bb0d12a6b462e255e5403ff917920d8b30b021c9c3f5f48115d54614e23973e1e963b3ca1a17fad879a56ae202f9fbf9aa88d32fc4085b55b6a9f8b498309a23366f0e7af710ebde93f137759eac1b92918d4968727f6fd51ee92613fe86ded7694886ea7efd95229ff2dc563e0379900622865362b6bcd361f3757c7e0746d0c4f223605d551175c5e1d5ff84a8fe8719c26234b48a855fedacb3651af5691cf5b545879256d979265bb1eaf92f59d22aa687ad4cc541103c46c6d68547"}, 0xf6, 0x3) syz_emit_ethernet(0xd7d, &(0x7f0000003140)=ANY=[@ANYBLOB="f125e2d75d6dbbbbbbbbbbbb080045000d6f00000000002f9078000000000a010101440c0003ac1414aa00000000070f00ac141400ffffffffffffffff442400037f00000100000000e0000001000000007f00000100000000ac1414aa00000000000420880b0b930000a3ccde6da76b6b838d19747f84dc96f5057b8ea3cf8fe7a86efa299168fc39bcd920aa25eee6287b984560c20b1e01dd68b5a469b4724152e7dc28b0c3430e04626293d1738194f16827777fca73bd0a45c5f6467b96306783b8d165758a1c4a928ab8d1eadcfe46758c8ed3eb152ce0b04e2aa8873a5e08fe2a1056443f5618bc4fc7eebcde943f191f89541e8c9b8be38679e8f444bdf10fc4c30c468b1d4394d9e5035d60e3177e749446d7cc387dfaed38611d0abddf0d3eafbd48249793e89bcdf1446ae8df1041397efdb2a17fab2ae6153b39360c651fc8481a484608d0901c1983b20f49f9da64fa536a9d1a983f9eca66a520aeb956a5a73ab042e106ceed70f4d502864dcf0531c0bbabbe51a5a85cce919dfe0c9230478021ef81a5fd3643e0600552b0eda0083fc71c03ba154b7b55ad478c4e364e1e14673ed35db7b4282797f124c465102993d9c1ad7d66af2496d78a0cb03fa1772c046130944b6e96855e502e58ae815fd2bf1a7f7fa17cddb3c2396c4e271bf3d85878b73070885d8d2f82042eddb2adea65327daf83c382e73c1319008bdbcee4936910c5954ae3e323ac2fae7db552efa7b90e9b2eb57a9355a63a9d20321e6887666e57892365b48dd14f228edd4f894dda1472761343168536dd52cbb76861c890a70a4f5804b3b98c2f7e71d1132001cf93f5780c0a5806305fae1e8c5d793550028a91cf3f083dfa4c6ab2804b206fc7f24ca2a19796954aa957335e8a2aad1366af598360815b1f21657f0ef6be7981ac4a58265d7a860cd9682c8a3d619dc739c91c25be30f993907522aaba628ca3f7041de69ef891b89203647a5bd45790025a172525bf2554c3f967ab22ef3e256c07be288240ea5b0b7bf39f29c76ac4dc3ed2b1aeea2611da35e16dd4d93dd0cf8169e0568d75f1f86a95e0435537037b2e7c40780aa542a29daed5bcdcc579148b30e77fe32adc0cf24b9853ffa056929b1cc72bf41d33946817bc8232aaa01395d07a33e4218fe06596633965cf21abc44ffddc20d6f4fc54732d84374c4870aa9bf3427e179e3e44646cda7c696a3b1dafd442646329b2b24bf0c3f2ed49c61d088a1a70c870b703af8d1994e5027f755bea91b15c3dcc2dbf90966ebe99b76784402ec7293f0481513d6671a90f8acf05b3cd26dda8feb7607968e78b635052ead44d4598a9d5717bf0982a5762a57e51edecd0b94d6351550a22b8a2e82e0067a9566c3f4743449e65e265cf9e2abfb7abc88b80b1770e3509eba51c170b698c0900cdfe8e50ae929822fd01d4c2f346cff180214eb2a6e7fb8f68eb0e8d88debbe1ef37a9a3d332f944526124c942e4df69dfb6eaf68c71ec1531b36290ffe943e21ecc75ac4c998745dfbfd92217c3ae2ce1cf87c15e141a27bc4c0b35c4c5dad8ab05695d0d1a0977671b70f59f5919a8946ebf574ce09222540fbf1176bad00661cceb90200ad51328a77a1b153f966869fa154bcb7526a05dab6b385cc726a2f91325cd73380ee89b217826e7e6f51141e82b0f9876ca4971c9af40e97e24402aa012f80142f149a7f0c95d9dbd9d5499660771c8be1e9130c0edad4ed5844b76fa6761ca00ae8d823afd074f66e6b84d2ab8c9f08ff68b3fe056aa0427e43606ec1e79b1d8522ea9d5c04889112a66f9608f0472594cfbafa0f8d8dfdae4c88238b352172043cfe6f8ed69a5ae037a0744faa30b7f54e88278ce2b886a671f533bc165ea2c9bb37ff58fa063b0982d0930a7ab8db96d6182b08f5b8bf71a3ca1d2c7f1563e586f5ebfc839b1043ee57eeda7070ce2d7e53de02ffc2687d9fdd3717ab1a2e53491c2aba15a2e3de6c423956154a8dd8d07bdc8ba10eb90737b89f8da7ae12faf8b707f5630885aa44678ee107941a0bc4635e49222c2da287429df267073055046b3dc05cdf0bdc189a45352c544f105e436f0b6e66627d70d1c091e0a2056d8b27732406208396736a8b3c694205a971d4b1cf2658b9095ade28c2f3a1b2df568354f6a26b0b8f42013aeebd5d92a4039b90d2613335e5f70fea336007f63f1765312457729ccc6b481cf9c05a82143fc71ce26eed04f046fba4f873f417061bab820a28de33333f2a005b3d09af31740d09701f92d6cb1662c9780553d26dc6b62567283a15be89b5df0856dd951cec05a6c4c50186de62e1c28917a390526294761aa72e005f1b8b3bd6707228ffa6544253ba144712004909941aded30226cc797ead1d39abd544a11ba388ffb566bd87cb41af56232504ce24b1d944a182362a6d9317cdb82bce2e83773500527a55572ed7b88c0c422568fe473cf19042d8bb00ccc26fc9041073254ea7f46f7355de36b9c2a2fdb604acd813acc2e43323fc442d94c81a2d6960d9bc7b0e5766731e59054a4d5f91eab26a7ec17cb74e729836bc3d1d0b2f8d60614ffbf9ef5223740bf944dae183dafe830670656afc6366fd57655b607519a731877ce38fca09b0fcba7b4c76a3adfbe7f64a8ed21c11590e08a0b57d3abc7bc9bf3ae89228b0b0500000086236ad411439c8e1d21b5b848d6f1fe1be8ee7217cb9dfa8eeea8a2158c32dc482444f375225233bd437a5bd4c69e52dd9f29343844cf675b92a41d56f376c9eed65f2711031077e86ab42aa0b6651e3448b03ef3e957ff6b30550491a2ffb955d9562d5d99da598497e950f7cd1bb86e84e8b8b7e48d505c20c2f645c0f75c9a771939e2ad36192ed167b4b413f3f6ce76544e5a47c2da89757917d1e704b374f5cbb6bd7d0ecc002b294336b28011655e9d72fdebebde1dafaad8e06ad1eba8ddcf02f510345597516d5477a3c8ceb4e4c1f1767d50c19d74fbe328d46107ea64e9ddc9ad33a4c4a031ef05357c60a9d27de8cb93588fe827dbce3ca413e86ac7d24efebc1b56a000759d51d3571f243ba53a7016ebbed2199284df37a640038ba23ef9560c0e5b49a7c945a27066103bc54aa745bd454bfe13125ccef30b0343ccc1b58d82f544c6f5fb8fd994d1b189344fac7fdd6246a8c52177f0ced2056265d8cf6e235d269577b6ae038305aa0e8d139564bc6953eadc0f8c98128dd9731581f965d1bd73c9e759e01694921aeec12bf31a3c326f99a9e369ce0956291ec2369a78db0df3acd71ff10363e03631d7b4ed30ce14f3a6819c30b13b40d588b42d5771bb04e24a3a5be4ac91cd7be9e50157df907b4dccae50bf14cdf7a9142e8e72b04a7f05d0b3bf260121e2a9c0faf778915d191b2bd1167f5ad95159c77ea38fb7ab2403d0505f39ff75e39b639ed862fd7bba4cc238b55de520053761ea8d6ad81c426d9850025a558d5d48552515567125450afce4b695ec5637d04a1b83c90beeaa670d14a4f2e7d94adeae0b885da83c0c17cfd15029e1371bf51c5d4593490dfa83fb600ef769efe9baf3d47ca46d68b24ccf378c43e1e0cb29ef020236e7987aadce45b1d52aeaef2d02a84dc6c9cd2c4f17e73e4c57df83687916d32f0492249c24c44a99ceed3d9eda5cb620f277473d48b169c1f0bcb8ba8c5f344ec88953acddf679694c6aaac5bd406c11e4c11825a541801bdc082b459523c7ae8df8bf4db4816263b30b9c6efd6389d5348bd3f47fe784a62bb595d77577b875875d5e44456e08c9006b3fb0f63a7c8f7b95c8d4aea830c90aea1ec16a6593e99753130bb916af5826b4d4eaf952610bba99bab6697c78d7bb5d77c13232efc28a16e9e53ceceaec124c000a4e33e617229bd7d143db504806d04412b0fd094579ffdc0c8d6d232481005c579a56ce5c7e08e014167f40459eaaf2745d31cdd3b17bc3fbf4987c2eb348f107ef3aa948f32de478c0e0a27fc835ee33f9c35ddb48bf11f344127618e128910c9cc9c3530c67d8cd62463b3b67a1f29f03b32c2444509edcb4ff606d44f667c747a0f5990b32dd3e88ed82127cda431edb3f39d1e3a234e20dff2297b06e231a07c017e2ebbf6859f798ea316c0934bb3034fe01b1417e80cc9ed887090bebc7ae2a65e8439b5104c6e19fba054041c7642491ed4b8078130f098cdd5ad86607a66cbc727913a0dfba09d6c4261e5de91987c51155399f8a6928a27af89d0638bc29ab8020a33115b7526b44c663a6c788f1c39ec3479fa722a2154fbeea6ba7b0886006c1334c9e4543cb000008000000ee9df601abf67346b3f3f5f1580cb505f3b86a5d286f74d5ae32190cc957631bea5927698e6df3b69521fbcef798091d77d29282a2aca5faa1849f83ca155981c34d3aa1899c8da17e71c38d29129c000086dd0000000006c4b250e4e12d080088be00000000100000000100000000008001080022eb00000000200000000200000000000000000000000800655800000000de8ab6406672941f404fdb01ddc64aab396a9c678cfaa35edc8d095ba4c4a6596f95d10519db3d8cc633afa79554dab8fc6a6a6a49b2c90f202e9fdaea48e905509b5746444f6dc2e43a4e0c38f89864754657f408fcfe6755fffcf1b8f181352454b90c954a7ce4678afc1d9ffb9b20378bcac2e7da9aa9123e3e9f65a59584da7741cc1ad70b69dc8cc9c4a7793d335280578689869312ae338dcc473f47b0a1f746a1fe3fed559af6b3c4a628b8c536cc706e73ecb20b6220687141d578e7f027a4ecd08368af95e86eab8e6e7116c552a2c87872ae69522809b5faa5e69f6368718ae2e456df000000000000"], 0x0) 02:40:59 executing program 6: fallocate(0xffffffffffffffff, 0x8, 0x0, 0x204) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xf}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) r2 = dup(r1) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x50}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f00000001c0)=0xc) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0xfffffffffffffffa}}, './file0/file0\x00'}) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x81, 0x7, 0x0, 0x0, 0x2, 0x20004, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x2, 0x1, 0x9, 0x0, 0x0, 0x101, 0x6}, r4, 0x7, r5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$security_capability(r3, &(0x7f0000000040), 0x0, 0x0, 0x1) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x44f43, 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, 0x0) lseek(r6, 0x0, 0x2) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r7, 0x0, r6, 0x0, 0x200f5ef, 0x0) open_tree(r6, &(0x7f0000000240)='./file0/file0\x00', 0x9501) openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 02:40:59 executing program 0: accept4$unix(0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000300)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)="ee808d7560c8583e0d4eda104cd19b2ee83a07f3f06e840547", 0x19}, {&(0x7f0000001580)="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", 0x1000}], 0x2, &(0x7f0000002580)=[{0x108, 0x108, 0x0, "7b610583e38c9365338d057222387eef05323632d4110c66c669bdd2b36f30699d0f38425ab291155d2b36859e3be8ec7248be52e4cab5162e6a99fa3f4b625ea1087bbec2470dd2f2c51ac225acf835730fc29ffb890260f7511855efc1cd3544fc7a583133ab1c5e39f45f37d0a5d6030d7ec309effdf593a98c662ae9e1a753148a424d3e3a82f9d2a2576e6972f2801876ac3daed6cd398b95385c1536cb1628600d0cad6da7da9ad7efc6e48e3d670e87ef80087b5e21ed02a942c1d20ba73057b9dcb58ef5eabe95fbca37b86652cd43f4ac45ce94e5205b0640838995fde4dc4a03aa36aeb8c50fd359b4a2a5ae7b"}, {0x90, 0x102, 0x5, "939e803349dec349de120ba0aaece80211f761e2b24c76b4604619b7d8a8d33dc193c888f8e3898c81ac30c594e47c13d714b7b1d532eb5398eb045cb3ee2983daca83da2c1732d52ccf4e0a24aa7f994286a51a6dc285d86846ee462b7f2607a0624b3886f5e352d7e65ccaa78edb08a91397f2cf2c23f6ed2bfb34296e1a"}, {0x48, 0x10d, 0xd5, "4a53edd4dc90994ada88fa1a2bfeb33ff8a919afdee60b2fe35620f5ed1d10558b271fe1fedb302344671c9f8b04d0cb4266b83d"}, {0x70, 0x14, 0xea12, "07569080b3f7e7ccc394ee8ab1e4c58807c97ae855fcf7991863db7617ef488558e47fc4d5b346431a29557f3406296d935a7e200184a85bd665fb19acfac90998f1aaa50ab1f5e5ce248a5ad07d6484edcd1513724f72f9c8"}, {0xe8, 0x101, 0x4, "e42d4ed657de19e51868acbeec00a32bdee5f0d99dd6e740647f43b4143da9868eaeb778217b72466865fcab22d430f249401e52516bbc27b864e34d233464608f78da7d3401076e7da87e40585f5ff4b9867c0ec3e2e5b5054eb6bd63b4ede81427f2f7ebe303b8dc730c8631bec4dcd58bdf40a3f218bff1761f704cdc4074d1c0a8666841e275d1bfb0ed297b5a1874ef23ff11469ca2a81b700f1e68b5a0c4e14551ad1be0d2cef1326ac5963745f81b56b8082040262503d2c5d2a4f913d22c26149b81458cd08221ed1db5004545199466d5"}, {0x70, 0x104, 0x480, "6eccd5b0c9496382c040eacf8cba86240835cad7ba1009c0b81e07dfe9a1597f617fb0970c6bc0e5c6f0829b36d2802e98cff484d314cf7b4d4744577a8722bf7d6623227c9a301f768ae35f0126ab9785109a2b6ef227a6af7fb3"}, {0x1010, 0x0, 0x1, "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"}, {0xf0, 0xb9, 0x2, "d2a6f7f8a4bd1edc7e37e6ff16e2b81649e91c6a783472ae2a65b85f32792bd2446bc436f2da24160dc3d6b406489789ebc91b09ff5851856efb2d48817cdfe27d614f0c7c298d1b5a2496a0b6c14548a52139d88a24ce92c3abd76df7b341fc0c930748e9fa85a8c60fc9d631c3c2c7c5248e5b8e6c1ac2e5ad566b35e3451e879159b13b03d3a045f11beb0503b279827722d46511973f30b6e80f5ead288b8e319f31eda8fd786dde06a606d3e9b491b56a4c48e60c512bc74a8a136e7df1d0b6469739fcb168ab2ab38daa301830337a652c428af143a5725ad4"}], 0x14a8}, 0x24000840) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/icmp6\x00') preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000200)=""/135, 0x87}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000580)={r4, r3, "66811f68e0c440bba4bcf609493241b2512dbb6769ef1fdb21219441b9d2937255c56ea8b443729c72bc47cf6386f73b7ce88432ac6f99b63a93b89e7443b46a773671dded77dc24ba79debef1df5ffcd9e2222930e25f8b7e1873aae1853d7d55b7b3b64a43657809e8ea816519bc0c7323593b9e24a473e537db27b2a3ba9b30d958d7ff8d4867d47df99ca9958a196ce0c3c2c20e2a72af42aafe94c107a043d58527121953dfabf2d3ba6f3e7b2f09c47a4a55c3f5a3e68724037035d781567270a828be9bbe626a85ac9fe77bfa461f8903fcd4986a3dcc6fa6ec88fc174630b23dd02e3cf61e2117f78c9d99aa7daf6f8a7d6c4a01ad17f50051be2848", "53e73264eba58c5de5d2384abbe8dd8ea72be01bfcd6daa041050a23a5ec27d5dcf0aed87f9bcc869c6ebf1c3630de884b54dd6680e1dea34f661675f984828459321f42fb83d749067850004e9da3375748fa74a4330a66e3ea1e62f2f6413aef353e78ed2acf544d3beb96eefde8336ba9c02208396979ec975179883dacee433aefb6ff1cd41b6438d2f32e0763cdc310e834afb6b92ba385e602882f705da688e37726aef9cc058a02dab68133c46f77e2355193c18fc3c0d70c5856ca61d344026973f15aa81b370a08537ef3733f3c6e5ca3c7b5de9386956019ec0bba0cd387dd3f63606989591987a9dfb27d9225a164158997325d0ef88eae9e1fc00645611ce229cf3e40de15b3798048876412e5224b27b51f15785fc3f6dd8af730312e558319274b8ada98580edfb7097b11502fce5a5abc504db249764eef116b808513d550660c186ed0f5f4921fb7b6cc0529c1eb72438455c1f667d0bd0b171b89b519612913b0152cd1b420b2a9a4df55199a0ebe110d1fcf5eebb46b91e7ae1c5c95c48038dd738f8cf670c2de9bb3d3a6f092d5738fa7ed3d6a657841bb3bed0dee2895781d82e4e2dc6b51998e88e86ff53f21a4ae8ac780306d35e90eb2dc5a3f3a7d43f5dd7ce3807cb00600f7e8754eabcc815bbef1a5382cd7ca73cc85d53020c051882911aecdf9b0ce7c1bfdfa8d820d5efd4b60bacb7e64d98fac78810f085c51a19b89289772196915c93a0503694ed2af76b6960aecf0f1af22ada485b6ac62befdf35a0916678df405ca99925089cd3812d7b09e3f91f4daa94d464df0725249ede75cc626be7a8ed7cb87c0ed46675ed79618746c44729fe831f1cf4e485815bd9f7cdf455f6437f736858cf3026b18ba39d1bddbf58e9952b7d4b566955b80cc3c058fca3cb7e6c5159c3e7367d09ef3e8881179f51c10baf5cf29c8dcdbebdfa73cda0d9ccf8ab5af9240f88f78633be5d7d91da541cfcc01d59ac4936edf9920b67d19a1a093cfd4e594a8b369da465604212c6af340f0ade89223c631ba2db120ac9cfa9bda5b00358cea4c63d66f2b99dd3d575657609224a8874f12e80025173bfe43d35072e1ca14d097201178a8e27e62d4ecad1833aef65d12690ab97e0a15fd60302d1e7e516c3a9440e8535d0d4615d173607be209fcf2b91227519a808f51bc24197c0d63d0e522cf60427c95fae6e6c4bff0f4adb0902b8746738b1098bcf3a884850b7d18856d5ed07580965a693c8f95654cba9fb33f8c46b01347b074e5709fe982852e0f23e5a83215b3547edca8386bd9ebeda5807f3e6fe9dd1b3030abe916e3b7ba9c0b6130acd60f0c9719b3eb136bc8f3690b3f8e8f0d99f88bc6492024e59be459d5a08eaff70c6be9aa884faf2b69a915e191dd6ad34c75e30a06a714969e7a679756d8a76b1c8524deb5d6c868ef5e216369e6bb5207052fd7e5df3fcf8763ca2bfd9db080558571e851862dcd200491138dfd8e5b285f2e68d5e4968d8259c3df6d28fc5fb636ecc7d3fcb3f4af712c8b1d69f9012b07f7e34d8e5e76708c0a50b75d880b65fff32b4cd092fd1c6b2c36c36bea6a1308144ffc8ef9f6f717fe63dbfdfc0a95fc89ada3cb322a9033c5e72b5bc4cf8aadc1f730955fffde0a2881779e1d61b2874269bf1aec2fd075a1616cd3908edcd912f86a8003f39ad8330cde56d5875d495fa2d0941a07b20502f4211ed029b6546bfc50aa2299f8bcf6d524fac760cb74ed195f9cd8f99a027ab4556ccbb486d6a8a0914e654b6add10e68084c6f2e4c66a001bc09de3bf665642833680e4452a21f4686b865ba8e7ed9ac6a5cb932b25aa71a7b1e0146a4cf6390b96bd66fe6f26117b215a1262c8b8fbeed354937d55ca22a8c5927e20a620f4999bd91c0b523188a22efde8809abd90628c9593df695e4e3aad21831ff7db1d39b8839f476342c77cbeb15d12ed034c483c13cde875dc01fd14c1a8ec5529686d957b061f935cb9dbc24a8396cbc705cf7fb9d2169f7e3558ac7869fbd1c43aa9c9399ef0034366833c275000b59870c2ae4f2589c3c0d6b85b74b0a32a04bb5252e1e5201a3d082755a09720377361c5969e67842091fb92b6f7dc38abfb821bd40d0f1040595eb9481e5d28aa25605d87827e0905b350d9fd2750390f5d9025ef6ea30d15f616e932a4559d5c72b873300c8ff0dd44d4df7cd74f4f12f22d2855b2648bb6ecf492cc967cf9c32197c8ba8ec9d1e71aaf612a4dc4bc77aa49d858a6a0086160d0cabc5b31f8873d76cd4106f6a23031e75f6b97ec47a2fd26761ede9d980e40432d797da8e6e923d8bae939d925b84b944da98cd262a3009049d6983c2c17ddb1e693a24302b03497906af4323d0c5b2fb58eb6f9f5c256e56ec880e4d90e82ccc4b722e8f506217c9831d59e9de32e8f36163a43bb2ceb5cdcad19632d9d12bc64b2516cc8a28ddfb84f5c77e2aac8e1d45a7f31cae51f9fbc8a6629144518c291f2b5d5e7612d72213936c09653a91978a678eed3c90b9234ed165f581bfd1dd1dcf0c1286c1c3ce6fa77cced6db8c7ab033a565aa05193d6435ac3e45cd9957f0215cf0b45e71627f0b67dd979d04b916ac5317e73787704936f14a07988abfdc676b7a2cc5e2ace9e4a8b6773617c9067a01b984fcac1ad4d254c21c3259953e5c63fd3353cc4cb41b109c24280e7f40e8ee7f4dd232f6f774f37484cc9c7b5a7bcee9a1a9fef639d691592f63986777812c2e922a5ce336a8600856f94fd5eb3773794b252b971035b604d375cbd7ae53a42e0d1245b351bd11c02e0aaaa4ee7734c31be793398ef7a01d80a9f10d1265a3ec1f20bfb7434567b0a3e63a4a31edd15fc92eaee1e765c7dc8937a716e095bb1a6ac9cd63c5ad726c3d9b92d56a0f678a36c3ace4184139f2218f2b579458d94eb2c286e8ec8e098e62b76df1c4c9b5a8ece01172a75aadee376586c4b76de4d7b07c703eb35ffc7be32d78a94b0c8eddba4d4d6ff8712791a53ca61a92416afc7005c83193c4258a05d8a4aae34bc3d770a083df1badc1629659804152a351552c66265197ea63cc0ae3712b38b8b88ab1674ebeafd41211e62fb2bf1036c7865456478470a3e7276f2c60343d2a90b4a2799720f3a602930b656f369f59fbfd991d9c9d74fa0f46f8e7b8a37f78e212b03a9de446ef4f6d44e75f754dab9d5f0314ec30a302ba619b5bb85a474695ceef68a9b6669669387656e19335918d3d8537759b79f5a368b4b603f2891f151b8c828340811f87509f269ef4390e3b2a58fc8167b5ae7413d35d55667cab25636790be0beea3fc242af0d4a3a9c7d663fad6dbea1909ebf24fb38e95e014cc6afa979e83c21f5961a674c50300d9f9cb7e73708c316e66a9417719b3d9ae63e1ce33c437e900830c65825354ee88b17dec89dde804b7dc17203fa18072afa405a3add8a56cffb7fb691fac87c79bc09fb238e797f5a12e19ba70ef8f167ba0f45c46f32169295a5e6d86f566be3ee415b14e846bf358681ec554fa9d92f3573f41656a50b88596337ef766f98c5df83ff4f33185694a63d429e152b9f11c954f08f21b2607445be9d533c32fdb637537e94c4bd05ec69eb031c63cdccaa90ac852b0ce95d13ffa86ee708da2463d3d122dc235d50d92dfb55b49db8d6b6dc15701ec36006f55cbf4bdc45a67dc20874484175801514654a01a553b06817b179f92a9c8c34fe0d66529f6ca7f2b9b3f3724b80b6421448b96fd394a2f027864308f2b5788cd7b5098387cdeae1cb2ed26a4452ca0c5e28ef5c3c384181e9431ae5e0dfc7542a2a6037cb70468ee5787648223dc9c05696b9b28e1b8f78446798aed0f98e0092d32c356608b71d0716810fa247886f59eb360370221e8b2720654c6352da009c4bb0e7855a65d40e458739567c6f23b2c519126e012afa244d8a99733a1d1598b6c59f3ec9062e0c892f99540768bc9fe6bcb163577f05a7c1817b1806d3f766169aa1590fccc26b696a3e5ff5e338fd076f36e9713fd2b284ffd5ccbb68cc45d00249cbacf293908ccd47bfe1ce91329c75750762e91be71ef76ad2dddbea7ba8edaf70bf860a80ea8acc7183532b8f3498b1b2de9538e40b6cbc9b7f88c73b8952abd9c2d832d4d92bd2d00830d37418f33e58de35b49321654c762510b54c216a9f698772ddfe5082c8539e8158f3ea4e5b6fb4ce48dbac281fc20a7aebb5ecb021fede4c9c17e01e7fe5d8bda4e6fc6844a6014551044632654be6c519778ab18e28a67107163fff2ee942d2257d5dbeb3e19d6190ce4f9fc117e1d23f1f317baa0c377ea3b72d49ae28ecba77277a516cae36ba6ee91bcef308871efb5245cd9420bac262f3e91c96645ec5097ee802f0f103e9fcf8de5d809404006c91613e5eac580a05b135844e09e412fc728213a15ef64c035ce57c5c68724242d7f039c9b139609f523b9d8b2e90e3c85367ab09133d8c319b2d70b6d85ae0662b37a280ba8d02f80cb62e49dff9d062f536de074992998f0fe94a4a96310f262f3363d084ff5bf8bd0769a6c1f73a241b962310f21af08a8f7849ad64dfd37f665a3cedc817a788fcce1e739f784d8e336f5b83b6a1cf73225be911355e65945af07fef1190e31080d6b177b716f2244167e6eec76a275b4a3125df0eb196fd4fde958924282b47094497c1ffe0a128d6d9e409c69bb0c20a4fdc19a8b7ec4c4a54afb8746554c2846b2b713a91f678e688493db73e46ea8359357fe93e5f62542ecf874a56d7f7417f18b4fd0327b231ab73ad60d6532e533ccff78926faaab23722516a6525588c8b7fd064d12fe22994a19d20303f0761d4b6b59101884adeee090519df00f79b066bcfabbc92de6e9a6e8bf2fa5fb57d0c8cfa0448c61532f77faab33b25291bdd300a2c64c341c2a5a96a326e1a4216b4723c849ce2b6cd084693d0792571751a44ba30b80b62b4ff0cefcb5d508b93688abaf3283f8918861b35468ed4a44d4e2db9196531d9ad4d2ed8cd47457732e522289cc8cb3e45ac065075394826abcdf9787d8f0a89e79e3a053df27007f3316459cc7acb571486fae3e81238c8a329cfc2f2655bd349b29856babab75908b7d07657ffaa6e02981772e328465c2a82871fc1bc63ddbf12e2b124ace7a646e1412f95d04346e4ad5580e4de7a0b5c9deaf8e4449e222504a3d08825d30e745b7e875783cc8127f628c158e39333f07d6b1a14570b0632e1defa0803dbf8d6f987ffd3ac29243facf91ae4fdff11ea015b95df174438984598dea0ff3e820f973a987c6fa69a31fc6e5ba4920e6d7db43fa0cc6765351d781259d05caac19ee5d01d14101e369a567fc67dce565c42c1b16ab3c38a34bff78d64c7df1de4"}) 02:40:59 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 496.559591] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.6'. [ 496.562712] kauditd_printk_skb: 14 callbacks suppressed [ 496.562726] audit: type=1326 audit(1712630459.758:510): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5498 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 496.565439] audit: type=1326 audit(1712630459.759:511): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5498 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 496.572698] audit: type=1326 audit(1712630459.768:512): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5498 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 496.579718] audit: type=1326 audit(1712630459.773:513): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5498 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 496.592911] audit: type=1326 audit(1712630459.773:514): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5498 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 496.603834] audit: type=1326 audit(1712630459.780:515): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5498 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:40:59 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x9, 0x2, 0x80}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x12100, 0x0) preadv(r1, &(0x7f0000000380)=[{&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000100)=""/88, 0x58}, {&(0x7f0000000240)=""/116, 0x74}, {&(0x7f00000001c0)=""/10, 0xa}, {&(0x7f00000002c0)=""/108, 0x6c}], 0x5, 0x40, 0x0) fremovexattr(r0, &(0x7f0000000180)=@random={'security.', ')\x00'}) recvmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/196, 0xc4}, {&(0x7f00000007c0)=""/180, 0xb4}, {&(0x7f0000000880)=""/230, 0xe6}], 0x3, &(0x7f00000009c0)=""/61, 0x3d}, 0x400}, {{&(0x7f0000000a00)=@phonet, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000a80)=""/251, 0xfb}], 0x1, &(0x7f0000000cc0)=""/44, 0x2c}, 0x6b7a}, {{&(0x7f0000000d00)=@can, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/31, 0x1f}, {&(0x7f0000000dc0)=""/43, 0x2b}], 0x2, &(0x7f0000000e40)=""/134, 0x86}, 0x80000001}, {{&(0x7f0000000f00)=@generic, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)}, {&(0x7f0000000fc0)=""/81, 0x51}, {0x0}], 0x3, &(0x7f0000001080)}, 0x8}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001640)=""/195, 0xc3}, {&(0x7f0000001740)=""/110, 0x6e}], 0x2, &(0x7f0000001800)=""/51, 0x33}, 0x3}], 0x5, 0x10000, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x40}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x640c0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000000c0)='comm\x00') r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000340)={'wpan0\x00'}) [ 496.616934] audit: type=1326 audit(1712630459.781:516): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5498 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:40:59 executing program 0: accept4$unix(0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000300)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)="ee808d7560c8583e0d4eda104cd19b2ee83a07f3f06e840547", 0x19}, {&(0x7f0000001580)="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", 0x1000}], 0x2, &(0x7f0000002580)=[{0x108, 0x108, 0x0, "7b610583e38c9365338d057222387eef05323632d4110c66c669bdd2b36f30699d0f38425ab291155d2b36859e3be8ec7248be52e4cab5162e6a99fa3f4b625ea1087bbec2470dd2f2c51ac225acf835730fc29ffb890260f7511855efc1cd3544fc7a583133ab1c5e39f45f37d0a5d6030d7ec309effdf593a98c662ae9e1a753148a424d3e3a82f9d2a2576e6972f2801876ac3daed6cd398b95385c1536cb1628600d0cad6da7da9ad7efc6e48e3d670e87ef80087b5e21ed02a942c1d20ba73057b9dcb58ef5eabe95fbca37b86652cd43f4ac45ce94e5205b0640838995fde4dc4a03aa36aeb8c50fd359b4a2a5ae7b"}, {0x90, 0x102, 0x5, "939e803349dec349de120ba0aaece80211f761e2b24c76b4604619b7d8a8d33dc193c888f8e3898c81ac30c594e47c13d714b7b1d532eb5398eb045cb3ee2983daca83da2c1732d52ccf4e0a24aa7f994286a51a6dc285d86846ee462b7f2607a0624b3886f5e352d7e65ccaa78edb08a91397f2cf2c23f6ed2bfb34296e1a"}, {0x48, 0x10d, 0xd5, "4a53edd4dc90994ada88fa1a2bfeb33ff8a919afdee60b2fe35620f5ed1d10558b271fe1fedb302344671c9f8b04d0cb4266b83d"}, {0x70, 0x14, 0xea12, "07569080b3f7e7ccc394ee8ab1e4c58807c97ae855fcf7991863db7617ef488558e47fc4d5b346431a29557f3406296d935a7e200184a85bd665fb19acfac90998f1aaa50ab1f5e5ce248a5ad07d6484edcd1513724f72f9c8"}, {0xe8, 0x101, 0x4, "e42d4ed657de19e51868acbeec00a32bdee5f0d99dd6e740647f43b4143da9868eaeb778217b72466865fcab22d430f249401e52516bbc27b864e34d233464608f78da7d3401076e7da87e40585f5ff4b9867c0ec3e2e5b5054eb6bd63b4ede81427f2f7ebe303b8dc730c8631bec4dcd58bdf40a3f218bff1761f704cdc4074d1c0a8666841e275d1bfb0ed297b5a1874ef23ff11469ca2a81b700f1e68b5a0c4e14551ad1be0d2cef1326ac5963745f81b56b8082040262503d2c5d2a4f913d22c26149b81458cd08221ed1db5004545199466d5"}, {0x70, 0x104, 0x480, "6eccd5b0c9496382c040eacf8cba86240835cad7ba1009c0b81e07dfe9a1597f617fb0970c6bc0e5c6f0829b36d2802e98cff484d314cf7b4d4744577a8722bf7d6623227c9a301f768ae35f0126ab9785109a2b6ef227a6af7fb3"}, {0x1010, 0x0, 0x1, "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"}, {0xf0, 0xb9, 0x2, "d2a6f7f8a4bd1edc7e37e6ff16e2b81649e91c6a783472ae2a65b85f32792bd2446bc436f2da24160dc3d6b406489789ebc91b09ff5851856efb2d48817cdfe27d614f0c7c298d1b5a2496a0b6c14548a52139d88a24ce92c3abd76df7b341fc0c930748e9fa85a8c60fc9d631c3c2c7c5248e5b8e6c1ac2e5ad566b35e3451e879159b13b03d3a045f11beb0503b279827722d46511973f30b6e80f5ead288b8e319f31eda8fd786dde06a606d3e9b491b56a4c48e60c512bc74a8a136e7df1d0b6469739fcb168ab2ab38daa301830337a652c428af143a5725ad4"}], 0x14a8}, 0x24000840) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/icmp6\x00') preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000200)=""/135, 0x87}], 0x1, 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000580)={r4, r3, "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", "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"}) 02:40:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) [ 496.678967] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.6'. 02:40:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x99b}, 0x0, 0x8, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001000003bdb293e23f4080000008004001400"/38], 0x24}}, 0x0) 02:40:59 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414bb, {0x2, 0x0, @broadcast}}) fallocate(r1, 0x1d, 0xfffffffffffffffe, 0xb35c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) 02:40:59 executing program 0: r0 = gettid() process_vm_readv(r0, &(0x7f0000001a40)=[{&(0x7f0000000040)=""/31, 0x1f}, {0x0}], 0x2, &(0x7f0000000280)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000000240)=""/10, 0xa}, {&(0x7f0000000080)=""/11, 0xb}, {&(0x7f00000000c0)=""/42, 0x2a}], 0x8, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x103900, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @rand_addr=0x64010101}, 0x0, 0x2, 0x3, 0x2}}, 0x0, 0x0, 0x1}, 0x1ff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) kcmp(r0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) clone3(&(0x7f0000000880)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000000)=[0x0, r0, 0x0], 0x3}, 0x58) [ 496.766411] audit: type=1326 audit(1712630459.962:517): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5529 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 496.769214] audit: type=1326 audit(1712630459.962:518): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5529 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:40:59 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x18, 0x12, 0x101, 0x0, 0x0, {}, [@nested={0x4, 0x36}]}, 0x18}}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L+', 0x7fffffff}, 0x16, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0/file0\x00', 0x10000000000, 0x0, 0x0, 0xc0000, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x145200, 0x30) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000440)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008bfca0642cf5dc46f7ffffff55d874c740080d8836cc2100ada6b9397961091969756aef14a8673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESOCT, @ANYRESHEX]) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000ffff, 0x0, "0489fdc1843fc745ea52a5fff7962e807836db"}) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)=0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x2, r2, 0x5, 0x80000}) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x50000, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000200)=0x2, 0x100000001) unshare(0x48020200) openat(r3, &(0x7f0000000340)='./file0/file0\x00', 0x400, 0x148) 02:40:59 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 496.773676] audit: type=1326 audit(1712630459.969:519): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5529 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:40:59 executing program 2: creat(0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x28, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r1 = syz_io_uring_setup(0x457e, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x1, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000180)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x59f5ee0a7c70a1ba, 0x0, @fd=r1, 0x3, 0x0, 0x1, 0x0, 0x1, {0x0, r5}}, 0xbd53) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, r1, 0x8000000) syz_io_uring_submit(r6, r3, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r0, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r4}}, 0x7) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x59f5ee0a7c70a1ba, 0x0, @fd, 0x3, 0x0, 0x1, 0x0, 0x1, {0x0, r7}}, 0xbd53) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r8, 0x0, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd, 0x2, 0x1ee, 0x5, 0x4}, 0x7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)={0x652000, 0x2, 0x2}, &(0x7f0000000340)='./file0\x00', 0x18, 0x0, 0x23456}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x7, &(0x7f0000000040)={0x77359400}, 0x1, 0x1, 0x1, {0x0, r4}}, 0x5) socket$inet6_udp(0xa, 0x2, 0x0) migrate_pages(0x0, 0x4, &(0x7f0000000200)=0x7a52b9a7, &(0x7f0000000240)=0x1) 02:41:00 executing program 5: ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') pread64(r1, &(0x7f0000000040)=""/55, 0x37, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="34010000170001000000000000000000fe8800000000000000000000000000010000000000000000e0000001000000000000000000000000ac1414bb000000000000000000000000fc00"/104, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="2001000000f4ffffff000000000000027f00000104000000000000000000000000000400000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000c0008000800080000000000"], 0x134}}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) close(0xffffffffffffffff) lseek(r0, 0x0, 0x2) r2 = socket$inet(0x2, 0xb, 0x0) shutdown(r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000540), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000600)={0x0, {{0x2, 0x4e21, @private}}}, 0x88) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r3, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:41:14 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x18, 0x12, 0x101, 0x0, 0x0, {}, [@nested={0x4, 0x36}]}, 0x18}}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L+', 0x7fffffff}, 0x16, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0/file0\x00', 0x10000000000, 0x0, 0x0, 0xc0000, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x145200, 0x30) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000440)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008bfca0642cf5dc46f7ffffff55d874c740080d8836cc2100ada6b9397961091969756aef14a8673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESOCT, @ANYRESHEX]) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000ffff, 0x0, "0489fdc1843fc745ea52a5fff7962e807836db"}) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)=0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x2, r2, 0x5, 0x80000}) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x50000, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000200)=0x2, 0x100000001) unshare(0x48020200) openat(r3, &(0x7f0000000340)='./file0/file0\x00', 0x400, 0x148) 02:41:14 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414bb, {0x2, 0x0, @broadcast}}) fallocate(r1, 0x1d, 0xfffffffffffffffe, 0xb35c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) 02:41:14 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x4001, 0x0) ioctl$PTP_CLOCK_GETCAPS(r3, 0x80503d01, &(0x7f0000000140)) 02:41:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@ETHTOOL_A_EEE_MODES_OURS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x20}, @ETHTOOL_A_EEE_MODES_OURS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x14}, 0x50074) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x501000, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000000)) signalfd(r2, &(0x7f0000000180), 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r2) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x80, 0x52, 0x20, 0x76, 0x0, 0x7ff, 0x10, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0xf46b, 0xb5}, 0x6, 0x9, 0x10000, 0x6, 0x9, 0xff, 0x1, 0x0, 0x200, 0x0, 0x6ea936bb}, 0x0, 0xe, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x7fff, 0x0, 0x0, 0x8, 0x0, 0xaafe}, 0x0, 0xe, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f00000002c0)={0x0, 0x5a, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x1}, 0x14}}, 0x0) 02:41:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 1) 02:41:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:41:14 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) capset(&(0x7f0000000180)={0x19980330, 0xffffffffffffffff}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x77359400}, {0x0, 0x989680}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001600010d0000000300ffffffff00"], 0x14}}, 0x0) lseek(r1, 0xffffffff, 0x902f90f22c7c3cf) read(r1, &(0x7f0000000080)=""/65, 0x41) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) [ 511.061488] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 02:41:14 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 511.092967] kauditd_printk_skb: 6 callbacks suppressed [ 511.092993] audit: type=1326 audit(1712630474.289:526): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 511.097776] audit: type=1326 audit(1712630474.289:527): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 511.102273] audit: type=1326 audit(1712630474.298:528): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 511.105850] audit: type=1326 audit(1712630474.299:529): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 511.108085] FAULT_INJECTION: forcing a failure. [ 511.108085] name failslab, interval 1, probability 0, space 0, times 1 [ 511.108243] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 511.109906] CPU: 0 PID: 5562 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 511.111615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 511.112810] Call Trace: [ 511.113212] dump_stack+0x107/0x167 [ 511.113767] should_fail.cold+0x5/0xa [ 511.114348] ? getname_flags.part.0+0x50/0x4f0 [ 511.115039] should_failslab+0x5/0x20 [ 511.115612] kmem_cache_alloc+0x5b/0x310 [ 511.116226] ? ksys_write+0x12d/0x260 [ 511.116805] getname_flags.part.0+0x50/0x4f0 [ 511.117468] ? __mutex_unlock_slowpath+0xe1/0x600 [ 511.118201] user_path_at_empty+0xa1/0x100 [ 511.118628] audit: type=1326 audit(1712630474.299:530): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 511.118833] path_setxattr+0x95/0x190 [ 511.121266] ? setxattr+0x330/0x330 [ 511.121823] ? ksys_write+0x1a9/0x260 [ 511.122402] ? __ia32_sys_read+0xb0/0xb0 [ 511.123029] __x64_sys_setxattr+0xc0/0x160 [ 511.123670] ? syscall_enter_from_user_mode+0x1d/0x50 [ 511.124449] do_syscall_64+0x33/0x40 [ 511.125014] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 511.125773] RIP: 0033:0x7efd311bab19 [ 511.126330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 511.129006] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 511.130144] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 511.131196] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 511.132261] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 511.133315] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 511.134364] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 [ 511.141202] audit: type=1326 audit(1712630474.337:531): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 511.153679] audit: type=1326 audit(1712630474.349:532): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 511.157974] audit: type=1326 audit(1712630474.350:533): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 511.160493] audit: type=1326 audit(1712630474.354:534): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 511.165697] audit: type=1326 audit(1712630474.354:535): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5555 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:41:14 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x18, 0x12, 0x101, 0x0, 0x0, {}, [@nested={0x4, 0x36}]}, 0x18}}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/72, 0x48) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)={'L+', 0x7fffffff}, 0x16, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0/file0\x00', 0x10000000000, 0x0, 0x0, 0xc0000, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x145200, 0x30) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000440)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008bfca0642cf5dc46f7ffffff55d874c740080d8836cc2100ada6b9397961091969756aef14a8673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESOCT, @ANYRESHEX]) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r2, 0x402c542c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000ffff, 0x0, "0489fdc1843fc745ea52a5fff7962e807836db"}) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)=0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x2, r2, 0x5, 0x80000}) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x50000, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000200)=0x2, 0x100000001) unshare(0x48020200) openat(r3, &(0x7f0000000340)='./file0/file0\x00', 0x400, 0x148) 02:41:14 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180)={0x0, 0x4ac1, 0x0, 0x2, 0x2b9}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080), 0x4) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x200001, 0x0) r6 = clone3(&(0x7f0000000780)={0x181256500, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), {0xd}, &(0x7f0000000680)=""/154, 0x9a, &(0x7f0000000940)=""/4096, &(0x7f0000000740)=[0xffffffffffffffff], 0x1, {r3}}, 0x58) r7 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x9a) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x6, 0x5, 0x20, 0x0, 0x0, 0x5, 0x18, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, @perf_bp={&(0x7f0000000340), 0x8}, 0x1080, 0x8000, 0x3, 0x6, 0x20, 0x5, 0x40, 0x0, 0x8, 0x0, 0x4}, r6, 0x5, r7, 0x2) sendmsg$ETHTOOL_MSG_COALESCE_SET(r5, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="3f17c7a54683ad095e45940000c22fcf3f61ec38f980828aadac41b0d5e09a4dbae21d71d1c74ac67c1d660b166d050772b5852336264b3b0e8502df31c8ce87c9c90b24e2be9d82b8fbf5a26fc71eab5372b20aa05b4993892d8dd0d91c3f8aa59144d65646489784506dc7106682bea76f311507f1081a", @ANYRES16=0x0, @ANYBLOB="080026bd7000fddbdf2514000000080011000900000005000c0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x4001) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x7, 0x0}, 0xb3}, 0x1c) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000900)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="a63a85f508c53b74be1cc06a8682449c18237d779b4f25f709ca", 0x1a}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0, 0x4000000}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000000, 0x10010, r4, 0x8000000) syz_io_uring_submit(r8, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 02:41:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:41:14 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414bb, {0x2, 0x0, @broadcast}}) fallocate(r1, 0x1d, 0xfffffffffffffffe, 0xb35c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) 02:41:14 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x0, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:41:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 2) 02:41:14 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x4001, 0x0) ioctl$PTP_CLOCK_GETCAPS(r3, 0x80503d01, &(0x7f0000000140)) 02:41:14 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414bb, {0x2, 0x0, @broadcast}}) fallocate(r1, 0x1d, 0xfffffffffffffffe, 0xb35c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) [ 511.402084] FAULT_INJECTION: forcing a failure. [ 511.402084] name failslab, interval 1, probability 0, space 0, times 0 [ 511.403849] CPU: 0 PID: 5594 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 511.404844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 511.406058] Call Trace: [ 511.406465] dump_stack+0x107/0x167 [ 511.407016] should_fail.cold+0x5/0xa [ 511.407600] ? create_object.isra.0+0x3a/0xa20 [ 511.408286] should_failslab+0x5/0x20 [ 511.408856] kmem_cache_alloc+0x5b/0x310 [ 511.409487] create_object.isra.0+0x3a/0xa20 [ 511.410144] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 511.410899] kmem_cache_alloc+0x159/0x310 [ 511.411532] getname_flags.part.0+0x50/0x4f0 [ 511.412181] ? __mutex_unlock_slowpath+0xe1/0x600 [ 511.412893] user_path_at_empty+0xa1/0x100 [ 511.413525] path_setxattr+0x95/0x190 [ 511.414096] ? setxattr+0x330/0x330 [ 511.414638] ? ksys_write+0x1a9/0x260 [ 511.415198] ? __ia32_sys_read+0xb0/0xb0 [ 511.415822] __x64_sys_setxattr+0xc0/0x160 [ 511.416454] ? syscall_enter_from_user_mode+0x1d/0x50 [ 511.417207] do_syscall_64+0x33/0x40 [ 511.417753] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 511.418499] RIP: 0033:0x7efd311bab19 [ 511.419042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 511.421679] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 511.422785] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 511.423828] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 511.424850] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 511.425879] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 511.426903] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 02:41:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:41:30 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r2 = fcntl$dupfd(r1, 0x0, r1) perf_event_open(&(0x7f0000001d80)={0x0, 0xfffffc74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0xb600, 0x0, 0x7, 0x0, 0x8000000b7a, 0x1000000, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x2e, 0xffffffffffffffff, 0xb) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) r3 = add_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="fa", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r3, 0x0, 0xffffffffffffffff) ioctl$KDDISABIO(r2, 0x4b37) clone(0x541a0000, 0x0, 0x0, 0x0, 0x0) 02:41:30 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414bb, {0x2, 0x0, @broadcast}}) fallocate(r1, 0x1d, 0xfffffffffffffffe, 0xb35c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) 02:41:30 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) lseek(r1, 0x0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) sendfile(r0, r3, 0x0, 0x20d315) 02:41:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 3) 02:41:30 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x4001, 0x0) ioctl$PTP_CLOCK_GETCAPS(r3, 0x80503d01, &(0x7f0000000140)) 02:41:30 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x0, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:41:30 executing program 6: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltgid}, {@posixacl}, {@loose}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@version_9p2000}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@measure}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x525142, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18}, './file1\x00'}) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000001c0)=0x1000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0xc, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 527.576135] FAULT_INJECTION: forcing a failure. [ 527.576135] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 527.577955] CPU: 1 PID: 5616 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 527.579052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 527.580284] Call Trace: [ 527.580675] dump_stack+0x107/0x167 [ 527.581218] should_fail.cold+0x5/0xa [ 527.581783] strncpy_from_user+0x34/0x470 [ 527.582391] getname_flags.part.0+0x95/0x4f0 [ 527.583053] ? __mutex_unlock_slowpath+0xe1/0x600 [ 527.583779] user_path_at_empty+0xa1/0x100 [ 527.584420] path_setxattr+0x95/0x190 [ 527.584995] ? setxattr+0x330/0x330 [ 527.585526] ? ksys_write+0x1a9/0x260 [ 527.586096] ? __ia32_sys_read+0xb0/0xb0 [ 527.586712] __x64_sys_setxattr+0xc0/0x160 [ 527.587347] ? syscall_enter_from_user_mode+0x1d/0x50 [ 527.588107] do_syscall_64+0x33/0x40 [ 527.588664] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 527.589419] RIP: 0033:0x7efd311bab19 [ 527.589978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 527.592642] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 527.593744] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 527.594790] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 527.595825] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 527.595837] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 527.595849] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 02:41:30 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414bb, {0x2, 0x0, @broadcast}}) fallocate(r1, 0x1d, 0xfffffffffffffffe, 0xb35c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) 02:41:30 executing program 5: msgsnd(0x0, 0x0, 0x3f9, 0x0) msgctl$IPC_RMID(0x0, 0x0) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=""/23) msgsnd(0x0, &(0x7f0000000040)={0x1}, 0xffffffffffffffe0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x3, 0x0) r0 = msgget(0x0, 0xc) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000300)=""/178) msgget(0x1, 0x100) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x4) getpgrp(0x0) pipe(&(0x7f00000002c0)) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000003c0)=""/229) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgrp(0x0) getpgrp(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x18}, 0x0, 0x0, 0x1002, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 02:41:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0xdc, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x19}}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x20}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x12}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x58}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x24000001}, 0x81) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000340)={0x4c, 0x12, 0x501, 0x0, 0x0, {0x7}}, 0x4c}}, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x74, 0x3, 0x3, 0x5, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x6}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x8000}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x1}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0xfffffffe}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xfffffc00}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x8}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x4}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x1}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x1000}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x9}]}, 0x74}, 0x1, 0x0, 0x0, 0x40000}, 0x2400c080) 02:41:30 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x0, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 527.771209] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 527.781734] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 527.795358] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 02:41:30 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x4001, 0x0) ioctl$PTP_CLOCK_GETCAPS(r3, 0x80503d01, &(0x7f0000000140)) 02:41:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 4) [ 527.799470] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 02:41:31 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308}, 0xac1414bb, {0x2, 0x0, @broadcast}}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) [ 527.892761] FAULT_INJECTION: forcing a failure. [ 527.892761] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 527.894874] CPU: 1 PID: 5637 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 527.895863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 527.897054] Call Trace: [ 527.897445] dump_stack+0x107/0x167 [ 527.897975] should_fail.cold+0x5/0xa [ 527.898536] strncpy_from_user+0x34/0x470 [ 527.899150] setxattr+0xc8/0x330 [ 527.899652] ? vfs_setxattr+0x270/0x270 [ 527.900234] ? filename_lookup+0x3c8/0x570 [ 527.900851] ? may_linkat+0x230/0x230 [ 527.901425] ? lock_acquire+0x197/0x470 [ 527.902014] ? path_setxattr+0xb5/0x190 [ 527.902600] ? lock_release+0x680/0x680 [ 527.903180] ? strncpy_from_user+0x9e/0x470 [ 527.903827] ? __mnt_want_write+0x196/0x280 [ 527.904461] path_setxattr+0x174/0x190 [ 527.905033] ? setxattr+0x330/0x330 [ 527.905570] ? __ia32_sys_read+0xb0/0xb0 [ 527.906168] __x64_sys_setxattr+0xc0/0x160 [ 527.906783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 527.907535] do_syscall_64+0x33/0x40 [ 527.908081] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 527.908819] RIP: 0033:0x7efd311bab19 [ 527.909356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 527.911984] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 527.913092] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 527.914112] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 527.915131] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 527.916160] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 527.917182] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 [ 527.946304] kauditd_printk_skb: 8 callbacks suppressed [ 527.946323] audit: type=1326 audit(1712630491.142:544): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5638 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 527.951071] audit: type=1326 audit(1712630491.142:545): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5638 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 527.961625] audit: type=1326 audit(1712630491.150:546): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5638 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 527.972437] audit: type=1326 audit(1712630491.151:547): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5638 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 527.982374] audit: type=1326 audit(1712630491.151:548): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5638 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 527.998001] audit: type=1326 audit(1712630491.152:549): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5638 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 528.010179] audit: type=1326 audit(1712630491.152:550): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5638 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:41:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000080)=ANY=[@ANYBLOB="1180c2000000aaaaaaaaaaaa0800450000700000000000019078ac1e0001ac1414aa0b00907800000000450000000080000000010000000000007f000001442c000000000000000000000000000000000000000000000000000000000000000000000000000000000000441466d500"/126], 0x0) [ 541.647369] audit: type=1326 audit(1712630504.843:551): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 541.669193] audit: type=1326 audit(1712630504.865:552): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 541.672940] audit: type=1326 audit(1712630504.865:553): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:41:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 5) 02:41:44 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x4001, 0x0) 02:41:44 executing program 6: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000500)={{r0}, "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"}) r2 = syz_io_uring_setup(0x8c3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x12d}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x1, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x1ff) syz_io_uring_submit(r5, r4, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x80000001) io_uring_enter(r2, 0x1c6, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x2}}, './file0\x00'}) io_uring_enter(r6, 0x35bd, 0x1b70, 0x0, &(0x7f0000000140)={[0xfff]}, 0x8) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r7, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r7, 0x40086602, &(0x7f0000000000)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) signalfd(r7, &(0x7f0000000180), 0x8) epoll_wait(r7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x1) 02:41:44 executing program 5: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROMRESET(r0, 0x5312) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_DISC_STATUS(r0, 0x5327) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x802, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) finit_module(r2, 0x0, 0x0) [ 541.698718] audit: type=1326 audit(1712630504.865:554): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 541.704831] audit: type=1326 audit(1712630504.874:555): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 541.710924] FAULT_INJECTION: forcing a failure. [ 541.710924] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.712617] CPU: 1 PID: 5656 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 541.713581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 541.714771] Call Trace: [ 541.715157] dump_stack+0x107/0x167 [ 541.715689] should_fail.cold+0x5/0xa [ 541.716255] strncpy_from_user+0x34/0x470 [ 541.716868] setxattr+0xc8/0x330 [ 541.717356] ? vfs_setxattr+0x270/0x270 [ 541.717934] ? filename_lookup+0x3c8/0x570 [ 541.718541] ? may_linkat+0x230/0x230 [ 541.719104] ? lock_acquire+0x197/0x470 [ 541.719454] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5662 comm=syz-executor.2 [ 541.719672] ? path_setxattr+0xb5/0x190 [ 541.722000] ? lock_release+0x680/0x680 [ 541.722576] ? strncpy_from_user+0x9e/0x470 [ 541.723217] ? __mnt_want_write+0x196/0x280 [ 541.723861] path_setxattr+0x174/0x190 [ 541.724433] ? setxattr+0x330/0x330 [ 541.724970] ? __ia32_sys_read+0xb0/0xb0 [ 541.725566] __x64_sys_setxattr+0xc0/0x160 [ 541.725974] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5663 comm=syz-executor.2 [ 541.726190] ? syscall_enter_from_user_mode+0x1d/0x50 [ 541.728595] do_syscall_64+0x33/0x40 [ 541.729141] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 541.729919] RIP: 0033:0x7efd311bab19 [ 541.730469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 541.733228] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 541.734375] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 541.735445] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 541.736525] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 541.737599] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 541.738670] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 [ 541.742193] audit: type=1326 audit(1712630504.874:556): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 541.758345] audit: type=1326 audit(1712630504.874:557): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 541.769344] audit: type=1326 audit(1712630504.877:558): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 541.778547] audit: type=1326 audit(1712630504.878:559): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 541.789549] audit: type=1326 audit(1712630504.878:560): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5650 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="ee01000200f2aff0712374e8d68f911915732e6d800b27588ccecd00"/40]) read$eventfd(r3, &(0x7f0000000100), 0x8) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x8) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0x7}, 0x7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x20, 0x0, 0x8000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYRES32=r4, @ANYBLOB="000000642e2f66696c6530005aa9174aa63ff823102ffccefcda41ccfbb80bff7698d8ebdb75831abd89b19a543cef5a51380c2a5c34edd5683c92599af31e56ca03f151c9310a0266a5bb5e3a9dff4292a329643e765d22840c"]) 02:41:44 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:41:44 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) socket$inet(0x2, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) 02:41:44 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000005f1c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r20}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r21}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r26}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r24}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r25}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {0x0, r22}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r23}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r18}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000601c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000611c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000613c0)={0xfff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12, r16}, {}, {r27}, {0x0, r28}], 0x5, "1851d6fd4e4a98"}) pread64(r0, &(0x7f0000000180)=""/215, 0xd7, 0x94dd) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r29 = syz_io_uring_setup(0x5d04, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x3}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000001180), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_BUFFERS(r29, 0x13, &(0x7f0000000000)=[{0x0}, {0x0}], 0x2) 02:41:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000018000100000000008f6f00000a00000000000000", @ANYRES32=0x0, @ANYBLOB="140005806c"], 0x30}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0xfc, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, '\x00', 0x32}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffda}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3, 0x6e1fed2430a780a4}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2c}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa85}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20004014}, 0xc000) 02:41:44 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(0x0, 0x0, 0x2001) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) 02:41:45 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) 02:41:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 6) 02:41:45 executing program 2: sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, 0x0, 0x40) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8be}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() fsync(r0) clock_gettime(0x0, &(0x7f0000002180)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001fc0)=[{{&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/148, 0x94}, {&(0x7f0000000100)=""/24, 0x18}], 0x2}, 0xbaa}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000380)=""/248, 0xf8}, {&(0x7f0000000480)=""/211, 0xd3}, {&(0x7f0000000580)=""/8, 0x8}, {&(0x7f00000005c0)}, {&(0x7f0000000600)=""/183, 0xb7}, {&(0x7f00000006c0)=""/183, 0xb7}, {&(0x7f0000000780)=""/31, 0x1f}, {&(0x7f00000007c0)=""/221, 0xdd}, {&(0x7f00000008c0)=""/15, 0xf}, {&(0x7f0000000900)=""/243, 0xf3}], 0xa, &(0x7f0000000ac0)=""/197, 0xc5}, 0x83}, {{&(0x7f0000000bc0)=@phonet, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000c40)=""/58, 0x3a}, {&(0x7f0000000c80)=""/8, 0x8}, {&(0x7f0000000cc0)=""/128, 0x80}, {&(0x7f0000000d40)=""/101, 0x65}, {&(0x7f0000000dc0)=""/51, 0x33}, {&(0x7f0000000e00)=""/3, 0x3}, {&(0x7f0000000e40)=""/240, 0xf0}, {&(0x7f0000000f40)=""/181, 0xb5}, {&(0x7f0000001000)=""/175, 0xaf}], 0x9, &(0x7f0000001180)=""/254, 0xfe}, 0x5}, {{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000001280)=""/157, 0x9d}, {&(0x7f0000001340)=""/90, 0x5a}], 0x2}, 0x9}, {{&(0x7f0000001400)=@x25, 0x80, &(0x7f0000001500)=[{&(0x7f0000001480)=""/66, 0x42}, {&(0x7f0000002300)=""/4096, 0x1000}], 0x2}, 0x8}, {{&(0x7f0000001540)=@nl=@unspec, 0x80, &(0x7f0000001b40)=[{&(0x7f00000015c0)=""/232, 0xe8}, {&(0x7f00000016c0)=""/34, 0x22}, {&(0x7f0000001700)=""/78, 0x4e}, {&(0x7f0000001780)=""/251, 0xfb}, {&(0x7f0000001900)=""/129, 0x81}, {&(0x7f00000019c0)=""/96, 0x60}, {&(0x7f0000001880)}], 0x7, &(0x7f0000001f40)=""/106, 0x6a}, 0x9}, {{0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000003300)=""/4096, 0x1000}], 0x1, &(0x7f0000001e80)=""/41, 0x29}, 0x8}], 0x7, 0x0, &(0x7f00000021c0)={r2, r3+10000000}) sendmsg$NL80211_CMD_ABORT_SCAN(r4, &(0x7f0000004380)={&(0x7f0000002200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000004340)={&(0x7f00000044c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000226bd7000fbdbdf257200000008000300", @ANYRES32=0x0, @ANYBLOB="56d84e353eff82c48c492f07086da442dc33409a6f0acd91fa96e6d18afa5282ad4abf06f011bd8d7eda99eb930cd2d619e9764ef8d82077186117d04f827617ea60126794d59f2a785ccbf3ec6944f3d4551a6a01f63e89c299638c2a7214256c89f08d73f280288d1066cfacedeb046d1d28d7facf33c953d2dcea96b9"], 0x1c}, 0x1, 0x0, 0x0, 0x8804}, 0x20020040) process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {0x0}], 0x2, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000005c0), 0x10240, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(0xffffffffffffffff, &(0x7f0000004480)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x800080}, 0xc, &(0x7f0000004440)={&(0x7f00000043c0)={0x4c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa2}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x76}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040800) ftruncate(r8, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r8, 0x40086602, &(0x7f0000000000)) signalfd(r8, &(0x7f0000000180), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x54197d3b) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40040140}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="000326bd7000ffdbdf250100001919df85b000000000000941000000140018002008007564703a73797a3000000000"], 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0x8880) fsync(r5) 02:41:45 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:41:45 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 541.992902] FAULT_INJECTION: forcing a failure. [ 541.992902] name failslab, interval 1, probability 0, space 0, times 0 [ 541.994624] CPU: 1 PID: 5678 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 541.995612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 541.996806] Call Trace: [ 541.997199] dump_stack+0x107/0x167 [ 541.997735] should_fail.cold+0x5/0xa [ 541.998291] ? create_object.isra.0+0x3a/0xa20 [ 541.998954] should_failslab+0x5/0x20 [ 541.999507] kmem_cache_alloc+0x5b/0x310 [ 542.000110] ? lock_downgrade+0x6d0/0x6d0 [ 542.000721] create_object.isra.0+0x3a/0xa20 [ 542.001358] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 542.002104] __kmalloc_node+0x1ae/0x420 [ 542.002692] kvmalloc_node+0x119/0x170 [ 542.003271] setxattr+0x14e/0x330 [ 542.003791] ? vfs_setxattr+0x270/0x270 [ 542.004370] ? filename_lookup+0x3c8/0x570 [ 542.005001] ? lock_acquire+0x197/0x470 [ 542.005576] ? path_setxattr+0xb5/0x190 [ 542.006168] ? lock_release+0x680/0x680 [ 542.006750] ? strncpy_from_user+0x9e/0x470 [ 542.007389] ? __mnt_want_write+0x196/0x280 [ 542.008039] path_setxattr+0x174/0x190 [ 542.008611] ? setxattr+0x330/0x330 [ 542.009143] ? __ia32_sys_read+0xb0/0xb0 [ 542.009741] __x64_sys_setxattr+0xc0/0x160 [ 542.010358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 542.011110] do_syscall_64+0x33/0x40 [ 542.011651] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 542.012403] RIP: 0033:0x7efd311bab19 [ 542.012944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 542.015557] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 542.016662] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 542.017687] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 542.018713] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 542.019737] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 542.020771] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 02:41:45 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x5}, 0x0, 0x0, 0x9}, 0x0, 0x0, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000001080)='mountinfo\x00') pread64(r1, &(0x7f0000000080)=""/4095, 0xfff, 0x5b) 02:41:45 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x101001, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)) signalfd(r4, &(0x7f0000000180), 0x8) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000000)) r6 = ioctl$TIOCGPTPEER(r5, 0x5441, 0x0) ioctl$TCXONC(r6, 0x540a, 0x1) r7 = socket$nl_route(0x10, 0x3, 0x0) io_submit(0x0, 0x7, &(0x7f0000000880)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x8001, 0xffffffffffffffff, &(0x7f00000002c0)="6e675a4e361d129b16fed45855ae42cec9cc5d26406d7eeea93a1dc81306c6907284ecc1583305c1c4c3c3dd450126ebe82054ac77de36d6b09c26bc9c3a7de5c215c70d1e78ed871d60820883dd7ade964562526efffc3fa398d6b2f73d943e259dd4b50bd0d56899fe49de6c5fd3c260eb0ba710735cf4f1e3ba25fed85ba8482a80fd718a48bba5c745f9f390fe0b0fb6239fe88fc6c2d52bd58c60968acb651b1ce69bee", 0xa6, 0x5, 0x0, 0x2, r1}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000380)="bae07063c88a1c19979e62ecea0eed76c8422cb69bd27440cbe623433c985df951206f68b96ce2a461547b6e7ceb437a015c0e21c1a00369958f470ed5d15a363805133f329d1a42a323194e1e5f8ce7e767dd8a8d00cf9b261582ff9cc2dd89780d789d4f6de3a7a557bf4a85201be86e241ec646f7f6b3bee1f84c38d923d3a40b838d32cd414c62ca5fb1806075234b602ab36e1e9a82db54a721970cfe50d59491b98df72e0fba6692a409de8121080f1ade02470b360efc5bc70402fbfd0d693ff9299e70b8e78983ffd03fc96c09aeed181b66a5d075f2fb40d56287ddd467a6ae96097dd2d6145a3e7fb627b701cb11", 0xf3, 0x0, 0x0, 0x0, r0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x3ff, r2, &(0x7f0000000480)="546d32d200556bc2d7793b1b058c9af92926264bfacfb0ca1abfd56bd386815eb01a8102c4173025698ef59162b11a2401f6b6648d3a29a066ba9f34df583c2d49514662edd1ca6213c63ee69d65aa3cb7c68a9eb403bee856e16fa818694c82e695a8cc066aaa195d12317263e087f603b047469c041afc93868cd036ff088d22303f2fc618f50178e2b6caf661d8075b458343e1158d7b0717f84f8c8cfb6936f877cdacc84a29c024e854ade5d1a72aaec93c56840d120cc366c9", 0xbc, 0x4}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0x8, r3, &(0x7f0000000540)="1b695087fddeb9cc4e41df05980e65", 0xf, 0x1, 0x0, 0x1, r4}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x6, r0, &(0x7f00000005c0)="62b8145aac6652c2a698a5257c13a82d3ec1634869f1dd27bd35302c1cbbbe1ef44769320793a3bc3d6fbef56c9d5b5c2e5ffc0943ab14d50ffecc3ee85e6cb94942680e11625896f87c4041faaa44a6647cc8d8d09b4f3a9e38d786cca60d002f730ac0a556386e8d69ec9ff1628d31fc0cb7157e8de54a4466d131750cb4cafcad93ca4b7ff88734cb55f8cf0427dc6f96e3aef381a30d0892589d4f", 0x9d, 0xe4, 0x0, 0x2}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0xe100, r6, &(0x7f00000006c0)="2052d33f27cd8d0db3770b2cace7ba958e98b1a1f4a8febc6c87c0c47514edbb23490212d7004bbcb5ca24b73e75dec13fa012701203f4e63493277f", 0x3c, 0x3, 0x0, 0x2}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x7, 0x2, r7, &(0x7f0000000740)="21b21aae3ca2b19bb15301cae538d62f2ab34659470426a71a55a3513ce84a75935b889c1913c545ceb173b33c204e86ec94a917a154244de29ad032009a2de9060aa1224c94e3afcd438cd70da8db8b0ddf83a063c886245b8b3378da604819586d424e43e4770f8623e5749c54fdb11a39aa3e915d056cf8ca2c5e96a1f4cba07bf6fa565e050d3d306391f7e3ba2a85f11bfa21867eeec302ddd55ca3de658ca4a70d4ac78e4b77ce2e299b3645607551f24d39e8c3998772fb461cfe51728ef407610e6cb134534bdc66cf5d26", 0xcf, 0x690, 0x0, 0x3}]) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) sendmsg$nl_generic(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001500210c00000000000000000a0000004400000014000100ff010000000000000000000000000001"], 0x2c}}, 0x0) 02:41:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)='\x00\x00\x00\x00\x00\x00', 0x6}, {&(0x7f0000000340)="17148c73933e8b57e1d697ff7ec9c9ab79434f08b5a1c41d96ad12b474b046e07c02283705fb06d5411f46a6bde5b5eab7f0b1776096c2eb1f2de69016b1b9bbae31fc1d9cd194479486d0f3be3178", 0x4f}], 0x2}, 0x81) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0), 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000300)=0x9, 0xfffffffffffffff9) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000006d26274e0000000000000000000000000440000009000080999e00009c000000848fc1a6fb61f1f07c07c9620d93535d11e3ea9932118f19ca7d07e5587fd2f69d3f44cecc4b4a23fb0b20d8619c8d4d73d6cfc929afab1520531f0424aaafc8e876160b24780cd9ac52c91a751f6591ba2e5b49e31de6af7b66f3dd9367797ec89c41f782d9ffffa176ab63f6a69924fd21ce4a83536e5449a9c59204d9aaa56ea1dbed22ebff0000000000000059ff15ab2a8160f6a707000000000000001e174c64b5ad6427c679738f08ba63bb63368da0ac9535d263abc1d3fa23e7b9bfbbbfcc0bb6a3a4e66aa2"], 0x24}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000000)=""/29, 0x1d}, {&(0x7f0000000040)=""/193, 0xc1}], 0x2) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x2000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x7fff) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$KDMKTONE(r5, 0x4b30, 0x5) ftruncate(0xffffffffffffffff, 0x1000003) ftruncate(r3, 0x3) acct(0x0) unshare(0x48020200) 02:41:45 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:41:45 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:41:45 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1000}}, './file0\x00'}) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="001000000000000027bd7000000000000000000006000400000000000600030000000000"], 0x24}}, 0x801) 02:41:45 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0x6, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x0, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) r1 = accept4(r0, &(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x80, 0x800) connect$netlink(r1, &(0x7f00000003c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000000c0)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x2f}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000}, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r0, 0x0, 0x0, 0xf5d, 0x5}, 0xfffffffe) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRESOCT=r4, @ANYRESOCT]) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYRESOCT, @ANYRES16=r2, @ANYBLOB="e38702e62156e0ab4c30279d99695ee5c7d4ce0fbc34f84be9352d9552fda04d98f096def512812ac24d76f21ccee92cd768fd62f3f1c086e7f3cb0075518055bc5b3c7c2a7e17351ef8bdd1253148506b2062f41cac1ff5cf08c7e84bd1db4f26501927da6b9bff9b0af9098e2d3e6cd48a40232826c30484241d5c1efe7b1dd95c50954904dbb9ba171b8dbcfb395e79af4315e2fdc0d7487d7f1387ceab9a48692774578a2a84bc40a2d2f9c897a21d3574d93226951da1b5"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x0) unshare(0x48020200) 02:41:45 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) [ 542.294273] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 542.425356] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 02:41:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 7) 02:41:58 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:41:58 executing program 7: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB="004b440206a64cfd10d8db2afdcb45ae95b375b03b0a5486f3ef810de51f6124c842e2c8135c10e6dfc3570eb60c579b31624294a70b5e39d15664b74ce2b9727aa79d5b06000000000000000200"/87, @ANYRES16=r2, @ANYBLOB="01000000000000000000010900000c00048005000300000000000800010000000000a8000c8034000b8008000a00dece000008000900445c311208000a004f67000008000900662f954e080009008a66963008000900df33180334000b8008000a00d322000008000900eb90e50708000900f3e4400408000a006b3a000008000900c1940b790800090048ee234414000b8008000a008e33000008000a008f90000014000b8008000a0001fc000008000a007034000014000b8008000900a3c3452a08000a0092cd0000100008800c0007800800060018000000"], 0xe0}}, 0x0) [ 555.463523] FAULT_INJECTION: forcing a failure. [ 555.463523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.464698] CPU: 1 PID: 5723 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 555.465325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 555.466093] Call Trace: [ 555.466344] dump_stack+0x107/0x167 [ 555.466688] should_fail.cold+0x5/0xa [ 555.467050] _copy_from_user+0x2e/0x1b0 [ 555.467426] setxattr+0x188/0x330 [ 555.467749] ? vfs_setxattr+0x270/0x270 [ 555.468136] ? filename_lookup+0x3c8/0x570 [ 555.468542] ? lock_acquire+0x197/0x470 [ 555.468913] ? path_setxattr+0xb5/0x190 [ 555.469289] ? lock_release+0x680/0x680 [ 555.469666] ? strncpy_from_user+0x9e/0x470 [ 555.470075] ? __mnt_want_write+0x196/0x280 [ 555.470482] path_setxattr+0x174/0x190 [ 555.470847] ? setxattr+0x330/0x330 [ 555.471195] ? __ia32_sys_read+0xb0/0xb0 [ 555.471579] __x64_sys_setxattr+0xc0/0x160 [ 555.471984] ? syscall_enter_from_user_mode+0x1d/0x50 [ 555.472461] do_syscall_64+0x33/0x40 [ 555.472808] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 555.473284] RIP: 0033:0x7efd311bab19 [ 555.473634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.475314] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 555.476026] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 555.476678] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 555.477337] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 555.477998] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 555.478657] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 [ 555.508851] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 555.515229] kauditd_printk_skb: 28 callbacks suppressed [ 555.515241] audit: type=1326 audit(1712630518.711:589): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5733 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 555.520379] audit: type=1326 audit(1712630518.716:590): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5733 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:41:58 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:41:58 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000000c2207000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'syzkaller1\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = accept$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, &(0x7f0000000100)=0x10) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0xf50f, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x6) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x13, 0xffffffffffffffff, 0x8000000) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r2 = socket$inet(0x2, 0xa, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000040)=[r2, r1], 0x2) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'veth1\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000001}, 0x12042}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'macsec0\x00', {0x2, 0x0, @empty}}) 02:41:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:41:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0x6, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x0, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) r1 = accept4(r0, &(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x80, 0x800) connect$netlink(r1, &(0x7f00000003c0)=@proc={0x10, 0x0, 0x25dfdbfd}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000000c0)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x2f}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000}, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r0, 0x0, 0x0, 0xf5d, 0x5}, 0xfffffffe) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRESOCT=r4, @ANYRESOCT]) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYRESOCT, @ANYRES16=r2, @ANYBLOB="e38702e62156e0ab4c30279d99695ee5c7d4ce0fbc34f84be9352d9552fda04d98f096def512812ac24d76f21ccee92cd768fd62f3f1c086e7f3cb0075518055bc5b3c7c2a7e17351ef8bdd1253148506b2062f41cac1ff5cf08c7e84bd1db4f26501927da6b9bff9b0af9098e2d3e6cd48a40232826c30484241d5c1efe7b1dd95c50954904dbb9ba171b8dbcfb395e79af4315e2fdc0d7487d7f1387ceab9a48692774578a2a84bc40a2d2f9c897a21d3574d93226951da1b5"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x0) unshare(0x48020200) 02:41:58 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 555.523822] audit: type=1326 audit(1712630518.719:591): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5733 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 555.530217] audit: type=1326 audit(1712630518.725:592): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5733 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 555.532220] audit: type=1326 audit(1712630518.725:593): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5733 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 555.554192] audit: type=1326 audit(1712630518.725:594): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5733 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 555.556358] audit: type=1326 audit(1712630518.726:595): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5733 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 555.576392] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 555.579455] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:41:58 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r1 = pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000bdb75b4178accf12442162672c73a0f5b148c065b4b97be68a8055e350c77531420cfaf175a43298a6a3e657de639964376b1533a8b33a3c6c9e36036ae7aac96ca66d4a8da40293a0553919f20c9b59f073d577209e2b9fd0bffc4e494e893fd6ceb6087bbfacd1b60c593f9991d654a5f1877c19754beb2be28f5ea539124a96ac527bb78d69db0600000000000000c4d1b31f5568f3694f76e8a943a1c51deab94a4a9b43cfcaba193d4ec9414c8dbc16877644e7eb53e8503991bbabb1ee2ccce8fde98db9ef541f5fd1867b0ce27ade11", @ANYRES32=r0, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./filetS']) r3 = perf_event_open(0x0, 0x0, 0x4, r2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) creat(&(0x7f0000000100)='./file0\x00', 0x26) setsockopt$sock_int(r5, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) r6 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, r6) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) copy_file_range(r3, &(0x7f0000000180)=0x5b2, r5, &(0x7f00000001c0)=0x1, 0x40, 0x0) sendfile(r5, r4, 0x0, 0x9bbb) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r1) 02:41:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:41:58 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:41:58 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:41:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:41:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 8) 02:41:58 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 555.788955] FAULT_INJECTION: forcing a failure. [ 555.788955] name failslab, interval 1, probability 0, space 0, times 0 [ 555.790072] CPU: 1 PID: 5761 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 555.790628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 555.791292] Call Trace: [ 555.791515] dump_stack+0x107/0x167 [ 555.791821] should_fail.cold+0x5/0xa [ 555.792143] ? kvmalloc_node+0x119/0x170 [ 555.792478] should_failslab+0x5/0x20 [ 555.792790] __kmalloc_node+0x76/0x420 [ 555.793129] ? __mutex_unlock_slowpath+0xe1/0x600 [ 555.793527] kvmalloc_node+0x119/0x170 [ 555.793867] simple_xattr_alloc+0x43/0xa0 [ 555.794224] simple_xattr_set+0x75/0x610 [ 555.794559] ? kernfs_vfs_user_xattr_set+0x3f0/0x3f0 [ 555.794991] ? kernfs_vfs_user_xattr_set+0x3f0/0x3f0 [ 555.795402] kernfs_vfs_xattr_set+0x80/0xb0 [ 555.795761] __vfs_setxattr+0x10f/0x180 [ 555.796100] ? xattr_resolve_name+0x3e0/0x3e0 [ 555.796490] ? security_capable+0x95/0xc0 [ 555.796846] __vfs_setxattr_noperm+0x11a/0x4c0 [ 555.797241] __vfs_setxattr_locked+0x1c3/0x250 [ 555.797620] vfs_setxattr+0xe8/0x270 [ 555.797932] ? __vfs_setxattr_locked+0x250/0x250 [ 555.798328] setxattr+0x23d/0x330 [ 555.798629] ? vfs_setxattr+0x270/0x270 [ 555.798967] ? filename_lookup+0x3c8/0x570 [ 555.799324] ? lock_acquire+0x197/0x470 [ 555.799651] ? path_setxattr+0xb5/0x190 [ 555.799984] ? lock_release+0x680/0x680 [ 555.800317] ? strncpy_from_user+0x9e/0x470 [ 555.800684] ? __mnt_want_write+0x196/0x280 [ 555.801045] path_setxattr+0x174/0x190 [ 555.801366] ? setxattr+0x330/0x330 [ 555.801668] ? __ia32_sys_read+0xb0/0xb0 [ 555.802008] __x64_sys_setxattr+0xc0/0x160 [ 555.802354] ? syscall_enter_from_user_mode+0x1d/0x50 [ 555.802776] do_syscall_64+0x33/0x40 [ 555.803077] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 555.803488] RIP: 0033:0x7efd311bab19 [ 555.803795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 555.805263] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 555.805871] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 555.806442] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 555.807008] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 555.807578] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 555.808165] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 [ 555.963486] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 555.968099] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:42:12 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:12 executing program 2: syz_mount_image$ext4(&(0x7f00000008c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x2}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 02:42:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') readv(r0, &(0x7f0000003700)=[{&(0x7f0000000200)=""/203, 0xcb}, {&(0x7f00000003c0)=""/121, 0x79}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f0000001740)=""/160, 0xa0}, {&(0x7f0000001640)=""/256, 0x100}, {&(0x7f0000003640)=""/128, 0x80}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f00000001c0)=""/57, 0x39}], 0x8) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) lseek(r0, 0x27b, 0x2) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000000)={0x7, 0x8, 0x2, 0x2, 0x2, [0x9, 0x6, 0x2, 0x101]}) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="fe", 0x1, 0x0) r2 = gettid() ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) r4 = dup(r1) dup3(r3, r4, 0x80000) process_vm_readv(r2, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {0x0}], 0x2, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) syz_open_procfs(r2, &(0x7f0000000140)='net/netstat\x00') fadvise64(r1, 0x1, 0x1, 0x4) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000100)=0x2) fallocate(r1, 0x14, 0xfffffffffffffffa, 0x7) 02:42:12 executing program 7: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000200)='./file0\x00', 0x5, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000240)="9cc56d56a9f6e29bdd8e15acdf942dcc32a6817b02d1739b12f52e6614b3714e25a9a5bc817dc23a00963196ff5b4b5ceda23fcdcfd3c58e9c42e37b2c421616ffc0c35edaf7eda94b9832138418122d6ac16cb694c4fea8e64d4bd994fdfef8d6f3222d95a5eeb49fff06d414e6d87d0900d7382ad6c98bfc92cd9cd96f98bacbd4da65720555692a8145d05eca982c5c3e262e28da", 0x96, 0x7}, {&(0x7f0000000300)="26e06197daf620a41df4746a2fea7888dc139b360f96f88b19830dd90d04cbe87c2d5aaedbc91ecc507e1785dc2476d16fa9c7db618e24c5372115c75236f6a7fcb59e452fecc09938f39931f9cf5d413ddd64aa9fd3391e8307f14fd94d7ab23fb16e3e1468c059e183fbd13e9c406eecf45a8b93c5a80dc4e5ed24e1619b12a124232803f29037a50d32a6d91bdc0d2733e7bdec7e2e2d969e7c0035c2c2b22e68de372dc0a981f03d451645245c375f", 0xb1, 0x3}], 0x100000c, &(0x7f0000000780)=ANY=[@ANYBLOB="646973636172642c6e6e6f6e756d7461696c3d312c726f6469722c6d6561737572652c736d61636b66736465663d3ae0232c736d61636b66736861743d2a2d5d5b2d5e2c61707072516973652c6d61736b3d5f455845432c736d61636b66736465663d7b2c736d61636b66736861743d002c736d61636b6673726f6f743d7b28a440252c00000000002fe010f8b1da1f2bcf0fa038cb614766e3263f402bb68f81bab350ae8a81b020e75cd9c52797e2ecba30"]) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x28}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000080)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write(r1, &(0x7f0000000500)="348d5ed85cdd15381c62a174ab7f0433ffaf2744e150ac76a031ef8424b53abfbf20d1a2967a3f862eb1c61efe7762e4b8619b5d", 0x34) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000017e10000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="100029bd7000fbdbdf250100000000000000e0d904da00a5f04c657468000000000000000000000000000000000000000000000000000083a8000000099b000000000000000000000000000000000000000000000000000000000000000000000000000033d592e12417476f220b12af8b4c93dc3dbe9f078d81d95c6b9b1219c890804b62710362f538c03d1e7d2e182fc322bedc23f134329570a532cffd644d1522ad07eb12"], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x40) pidfd_send_signal(r2, 0x41, &(0x7f0000000180)={0x3a, 0x4, 0xc6}, 0x0) syz_io_uring_complete(0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f00000000c0), 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x401070cd, 0x0) unshare(0x48020200) 02:42:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:42:12 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:42:12 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 9) [ 569.538415] FAULT_INJECTION: forcing a failure. [ 569.538415] name failslab, interval 1, probability 0, space 0, times 0 [ 569.540151] CPU: 1 PID: 5783 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 569.541179] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 569.542379] Call Trace: [ 569.542775] dump_stack+0x107/0x167 [ 569.543323] should_fail.cold+0x5/0xa [ 569.543905] ? create_object.isra.0+0x3a/0xa20 [ 569.544577] should_failslab+0x5/0x20 [ 569.545137] kmem_cache_alloc+0x5b/0x310 [ 569.545733] ? lock_downgrade+0x6d0/0x6d0 [ 569.546356] create_object.isra.0+0x3a/0xa20 [ 569.547017] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 569.547768] __kmalloc_node+0x1ae/0x420 [ 569.548378] kvmalloc_node+0x119/0x170 [ 569.548961] simple_xattr_alloc+0x43/0xa0 [ 569.549568] simple_xattr_set+0x75/0x610 [ 569.550166] ? kernfs_vfs_user_xattr_set+0x3f0/0x3f0 [ 569.550249] FAT-fs (loop7): Unrecognized mount option "nnonumtail=1" or missing value [ 569.550909] ? kernfs_vfs_user_xattr_set+0x3f0/0x3f0 [ 569.552799] kernfs_vfs_xattr_set+0x80/0xb0 [ 569.553420] __vfs_setxattr+0x10f/0x180 [ 569.554015] ? xattr_resolve_name+0x3e0/0x3e0 [ 569.554674] ? security_capable+0x95/0xc0 [ 569.555269] __vfs_setxattr_noperm+0x11a/0x4c0 [ 569.555944] __vfs_setxattr_locked+0x1c3/0x250 [ 569.556630] vfs_setxattr+0xe8/0x270 [ 569.557182] ? __vfs_setxattr_locked+0x250/0x250 [ 569.557886] setxattr+0x23d/0x330 [ 569.558386] ? vfs_setxattr+0x270/0x270 [ 569.558960] ? filename_lookup+0x3c8/0x570 [ 569.559575] ? lock_acquire+0x197/0x470 [ 569.560163] ? path_setxattr+0xb5/0x190 [ 569.560739] ? lock_release+0x680/0x680 [ 569.561323] ? strncpy_from_user+0x9e/0x470 [ 569.561963] ? __mnt_want_write+0x196/0x280 [ 569.562586] path_setxattr+0x174/0x190 [ 569.563144] ? setxattr+0x330/0x330 [ 569.563674] ? __ia32_sys_read+0xb0/0xb0 [ 569.564277] __x64_sys_setxattr+0xc0/0x160 [ 569.564904] ? syscall_enter_from_user_mode+0x1d/0x50 [ 569.565648] do_syscall_64+0x33/0x40 [ 569.566198] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 569.566943] RIP: 0033:0x7efd311bab19 [ 569.567479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 569.570138] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 569.571246] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 569.572292] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 569.573328] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 569.574358] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 569.575386] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 [ 569.609070] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 02:42:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) [ 569.661436] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 569.727908] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 569.737860] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 569.865966] FAT-fs (loop7): Unrecognized mount option "nnonumtail=1" or missing value 02:42:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000001280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001240)={&(0x7f0000000100)={0x1110, 0x0, 0x10, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x6e}, @void, @void}}, [@NL80211_ATTR_VENDOR_DATA={0x1004, 0xc5, "c4cfb6b0067e88f65ff0db3a94eb73fad690f49e959d08dfd4ea5edcec570981aed285ea947324939e70b14a8e19a85065f1a366b09f69ee608dc2c731fd5992840c0e77e4449561caa709990a36a813dbd5c349563e4ad606d17db2b45e19bcfad691e0b88641f88de3c916f88c48858402d00405d4fe40bbf1b99b67b7c9f86a8184a08d775fa603ba61df5f204818ff600c6ed6e411a1c2dee730fdc4e122e238f3fc0f670fb52256e62d8a9e9ef355f28cdfc7794a5aff1da992a3baea9740840bbf83a1f321a43b0cab8f0b9d2daf41a72c79b5b7e4070e0885743a07c3a2b93bc99ffa1da8e25155ec361afad0a2a3e2ac523ca9a7fc8d949e281d146765a97a892d97e0accabf203c0b8c30cd0f14967567789d53c9fe0bef164fee17dd48191b49a0e82fc23f01db9da336c58c19afeb99add783301b8412761f69d1d6bd4b372ed331a473c98e056888ff72f04d4d5b210d728851ff7ac29ceaee82beb9f7cf37240430c23978ba70e87e4715c0fca17d9e6008222d7f65d78ea2afb410299fa6552fb2d558463aef9354f5b3bd340a93d898ad6d2210d949f4673d98cd1f89908b0fc77419c6dff4d5e7dd3756aeca827ac792b655e1fdd4bd1857f506b9d61f196d48c6526cffe58c3101d6aa166f4eee1a3cfa50833bd56cd58d1611d85486b2f3bcbb99279f51abea2d3f0095fca56877fb4d0d38e902bc49c21e80d27b35a32e35f1dcd19cd512384440a9c9411f2dc357cb732a096c0e5d0a1f51828aabcdc9a7c7bae03a1156c33f56a8e8337bb70bc1bd20dc50ac163b3be6027dc6bd223ee55241391c51a0d584d62cb9afb85e36a30ddc3c9c465ea7c442a6fd53daaa04d2792c3a0fae0fe4c512b2578d6c3f03d91a20156511796a2d1a9aab9015a132ff78d4770e7f80df07a05777da3f0f449040982078374925d802c234194e283a635477bb1b0ff10742135b1776c8da611698f1cb7a3e0e91e2b3c9376751c37355757f6cda8a1d439d5ac60abfab1e59293980edd3b6af859b835b4aa4e7ae951df75b30e35b1e84d4ed2380ae389754b69ba2c9256332cdcc6632fda564b51e9951343ac387a0b09fb4aa5f99f580fd2e539a6e7557c0a978c94b684de3124e6792d81eb9150a3c0d4bc77efc4063b1d0b5cf3f5474191a65f99172872e9860ed13130c136ba7e6dedfc9afcf0267ca3a73e6df613a66083a2d50b5e747980a00622e184729772cb7d8d81c65cb78fdced1841c515e9c27c20e2ccda12d556ec5181cfbb208483ff746c985453eec25621afde6ed2de851b5c4ec8ea5ad70b4b759ce9e880037bc15264f1e5627c1b18b63cf3a5706fe74c5fb0a2b4e9acd0b234f11ac3b62bc55a7a3b06ab405b2cb9582f5e543682cccf7ad8466b014dad02f8180badd670aa53859b765de7d7f5b024008347ad7c25b1da20dad1039485fc8d06181bdfa4b10052314fd7f1f2b47d4ef33320f819ff8a5a56d817fb262c9c480bf99540288c17f23e0bbb73cfd4f48b81513f425ea97531f241b04af341f6d69dc6f90005e4759668e8e17f0a693aefa4cfc0ecfb469045eb145e573319cbb174483b57372ab48e3f792d5150aefd6748c37855686824c095b63c832951fc488b1be2ea721dc7e6af75f495838172be5f56da8c9438326fac38f43687cd277a35319388e036c27e27e9b4603e414c294956ae5e7a8fcfebc23a2f8002b942ab89ddee867eac387785398988d9ea726436576bdb5ccea70414e41805637b14469f90364c348336d4e245ea5c0586b11c8a2f8f2268ce3a7fb8dd1b406b7e3af7afb23436bdf046f79ba8376eb9a5ff7ba9bdbbfcc8c2ec4ce5a7b4e439380bd545b0ebc2cc53c526cb02c2c9d0c8c03446e935003872444db6e84a365d11b46a4e8f96f12aabf84769fd2549c03ebba0f3301d2c3ce2bad8b6334f2cd0f3fe5e2351084af7f531dafbe4a3a65705fef5586bada761deb74944c4575e8647182ae93464d8f9294cd138757a32be465d594c7063347c287d510dc7f8ee2b9262b3ef208d84fb02163efa99392aa32b7455e83b5549e973d9a789766e2df0de576f0addd945d1460d4d6d9896e71fefa65afd4ee3d848facd2b346f4c5edfc63bf433f187e06f5c33039c7947f6c7b9acc4150e7314c15fef859ddca0c167410c4df662bf82ae3a209f619e4f876b743467fb4532941e0a4007aa4081e43f6beae0966d63d7c2233d174390f81010f2803b2399f76e9f9bcead6d26141076e3c0e83ff4bfa5ba8c07dfc404c0123c0d45b4fd863d0326ec7629224af0c9dfbcbbb1b91f1fc1ed3d34fc289e3531e15e32f1914449123a825f98b303dfd9d2f35dfafefdabc62379d0f545003817237ad2997c2876c3726e6b3f12f8c07d74a51cfb1035806928e1bee649ef46f34766720783b00d88db8b48014348e06c446edce8ae13929c749e021910a6d7beccee45a032732331adf60693039a1bc0390c382176e02965f600d17c9128f4cfe052749b5b0e8e1c28a1bbdf4c90afcfb3ff33e205b887634b93de077f523cdf12b36a55a4a4b13a126e15f2d9912e4230be2fbe35d9dba1405671c53123c96bcea1c02147f248b0a66927520b5b965b8b25392fdb69e63bf1c660b0f3578219a727f04b07bf272863f50bb0bcdf553b906704e57721ccfaf36dd401c169a9ba7fcf38656f650bd894c98a1aa3ed826e79fd2388a27d1705760fa91a9b85ddb0929337a4d4240de43867c787dd9f468528e7e511291319a16f7ab5c53c483280ac2056103b3d61cd4be3ba7529891c17f745b495588bfb057e0d6643e5f6ff4772336435444bcb046b3be756dd78055df5e5192ed4975c2c6afac73f088ddcca06965584a1da14a58e6351df348a172062530663bbd893891e4ed0b67875cb42eb28451c2d5b0270d7253b578ddd702dbd6a1265237dea82701fbb838b70783e31d7091d0d29b2149c1d71a6247d82a9220aa5f422cfe2a80cd96cb3cb43425e1537e95e3e4e7eb78bd15c0e8d9428f95ab375e6bdc741c55294846d5efc66c0bfc4cf003aa9c5eaf543757e42534de9265abfcec2d34cddfbd1e0cdab9bfd9350fa28572299eba69134bd1640bf964494637b67a993c9b87030479b9cadb172926eacd2a75616309de593e8003d02123d67d20f2f4b0f5f0a80dfe3035ecafd662a3755e991ae3587dd961947c5c0d23ad03e5322e001ee7e4c213c57058f38d8c87e85575b5ace9ac639ea27c8fb417f239175ba32334d874d599bce7b8d5e86d45a9a13c9516f146640140f58d20fb1b800e33fcfe7771ed94e5c0e558c4d1bf30a44e856bf987886b2bf1d9730b14a6a08700d369fa8157d8a12df294d72fba695f102a0dc1b49c8b8b9547b13065d4919ef06b5a1ca4b59d8cb50ca633bacb5091a9b6ef1643378876dfe7d4ea77edf8304da064b06416718a6921bcf1c8ae67bf7c10b93e3371333fc2931e788c88a29f3c108c5dd7d01f5a06dc2c94d6c84ae8326c0cc3dad7be0f47af1d941d997541404744119ae61f75541b9e771d175cd41743b139418849b73c085bd34ea99b2d9c2f0a7143530f831af257663757275128720d43a5645d40ecb9d9ab810bde9a798610cca49409b66226a59a771c543ccb32bff8f2141b27324da8374a44b79b3161ecedf6c7aaa361b0ea0544325ed553efac452a306201bc403b382222521eeec34732a934fc5cb4cfa614757afeeba5a21dc2e0b775cbe9ce649afc6021a41d99639fa5a1a8f312f1fbdfe2e9255374a093678ef86b16698d0f810a5bf2a2c9885f17183fefc02de76bb708e87fc802e9c2ae713c31d4d2424b4e11730ea9ec7a3a3a0cca3d6ff4f6b9ffcb0a1d858424fb051bec910834496bc23f0e27b5c5a78961ec231d93fe0d1b29916a8a79ebdca6f465d13e049a89f930dcc91349014b1091f760952470fce290e3f02f0d573aea74858f25738f1456a1ac6f0da1eb640e9446a9de170ac8d102d26bd90810dbea19aafdd38ab93347c971f53d46317b27afa000134c5d1efc7f9aedb916354c44456bd0293f20bdbd0eb247189104530e942aed4328721533c8c5aa0ba793a37030de0cd39ed84383bd07af915a8ec9d6f636b65131b2a2a44c084109c2e0b3af54e50aa3e8e8a011f7fb63f8584f7218055522de2cfbc251e1413b0040273582e79f836be19aa0f37f5da870809b6ce3440649dd5ec666197b097ad31fd4f93befd69755d2b6a5261ed35da90ef1de40a0bbb9784714db7c258e8fa0d06cb4bdcd997599fd7bd2f79317899ad81a508c0a0ad65ca825567ac2df44899059ba8943032aa057b88f746e1985906b1de498c145a4ea2b4fbba82d69f757400ef727e86b05b825c6285cee9c47ac195055ed8400c97327a558ab65e0cdc9548ae3b56938eab84f55b9f14b28351a55463fbd88997a5444317824f565d99940031196b4f8872d30e24cc0b5d4a444852da47014c5e8c336c57edefbda5beb5c8d4dc1c90b52de837f5bd9ee90c0dc3b24cda1a61c90ae0499d2a5562a5a394b48fcb84235b7249b6d36fb73049359ef036e672b1c9cdf1fb041b568fa5c931522b92ec3fb7b15c72d2b0115db2a1ff1b83798e1907f8a68c4b2840908f9b01dae8546cf9826cfe2d4245c868180326959ccccd50c8936c7e5e689ff7b96529dc1dcfffe473bab2eea71a58c35eeed750a94f5960e409a944d728f4079370b149019e9b3add6ac1e75bb7ee73b90ac1de79859140c8999b733e252ee5926c198f6f64953563ece0db19e89882ef416cba09a74accacd0f294c374ad43b5842729030b44217beeee3588819d064727b84a411a5dd5ed79e38f8b34e9221aead556117bd1a1198727d690c474ff017a21dd8b4fd62c91e9e3ba17cda73db4ad6128768130c7746d0cfc157e0579e42eb3d9f5690e23078df97b0a1ffc01d0f3aed92749f4638ef3ab86334febc178cb721def8af657a4dadc869d1780957e5ed00a4688b7eec34687308d6aa7f6c01520090c78a9cf27753caa426059ec282c0599fdbb46c59776bd068d866e7a8ec16ed09a4210548259a719504ecaf07090dc26f4683cb2d631351397490639d2345fdf3d0b9a56c261dc1f9f1e00c77db6119d2a565f289a68615892a766977f3fedbe98201542ab2e7f3642b6068ccb88470862ade77d76a24c7b8c0a6645accc4605628f1f9e701ea3e9f00b582c7bcb38a7bccfa10e317fd656155a2ebdacec8fdab4e9cbee485c018d51572281dba6c2c008d1e364c816df3f593c703a9f69f1c5245f1ac87cc8a0247e64c45313783ef4e360a896a5ea9c2e37156d465629568910388642efb250036412fd91703e9446fa0c1bab758d02c2343c009c9342012ce450ea70e9a380146ae2cd5daa54d9afc490abf531612c001a09a09311b71c4c80607d00838961c121d4160443b0239a738681d805decc79d9619c8da26fac6f90828144bb8ccd804be7d995c4e40f4823aa052cc3c08f2e55678628ca945bbe69e7b717cbf6d6cfb132af200c990bfb8e8814890d5e1d1640ab89657ba2d8f057bc0ecb872fe723948011f9b66e0547940dc9fd093205ff91de8f11374d99b22d4e006997dce3048b343fb129c66bef3f5a1f2fcb29371b75e9da11d33860cc77439e8035cabb92a3f68035beb682f4d0687086b75b0e28a60b6b0b8adbc2701f31468600997a1753203778212b8f6804f1d9afda1788f0d7e9120f0b920c1f96d028bd9559472a8fdb79b53a046a87ae25186eddf69fa"}, @NL80211_ATTR_VENDOR_DATA={0xc9, 0xc5, "e3ecf08c2b3a3833aec3620161b8196b090438684c3fc043f1fa5011d959ecfb5de031579de26a2d26569916a070adc7279e2e84861448b32cd4aeae3eea9aaf4fd1bb0cd692c91f06ad19eaf43ae44c03e4969a0bd4e9e790d54562fbd2de17b79a64d9eec96d2a4776d551b9bf9f647c9cd58947ee50ccc338e6caab9f43e163d42532e549c6ee551951da2a60cc758eab4087c76aac2092575bbe1dbbef10775040f54acba5e4a6f79d18c76a59a1a40c36a5ec11532723637ad1a3c2cf1f4cbf583f00"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0xf410}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x80000001}, @NL80211_ATTR_VENDOR_DATA={0x13, 0xc5, "63451c0d021fbdb94da47fa7aedb5c"}]}, 0x1110}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 02:42:28 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:42:28 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000280), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0x121780) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000080)={'bridge_slave_1\x00', @ifru_mtu}) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 02:42:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:42:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 10) 02:42:28 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) ioctl$TCXONC(r2, 0x540a, 0x1) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:28 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x1000}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) vmsplice(r0, &(0x7f0000000240)=[{&(0x7f0000000300)="86db931cdcdb1281d36c7b5f88139c0d6ce3d804970fff8541c88f0e0be2546ab8ecd0e15e27b5dc05e8113907e63db0e9c4308c791761d2f98723c2e832f388de27863415dfba4c6a9f91668592f782a36cbe6f41fa6dbdfea17e0303c09181464c434c039d0de1fe1e15fb23c11666e747968f70eaac61cddf0ed424b4ca62d606f9f2ecbf01110378ff3e9e8c43171614f7837d7fc5704915300f12a2bcc04553fa5ec34e27228c0d987bccc920464bdd98933b54fcd9b89bf6ce9a835ce0039ea0418e086027281a7a", 0xcb}, {&(0x7f0000000140)="267eb81bfe134772a6987dd52bdfa91a736c47a7bc4fc77a684db1598cf958824d61bda8cf1ddfee7d5f88192c08ea38ce0c2b9ccc7bd35406b6953bb24467229d7983dc27d7fe2265b2036a062489154c4a296d81176e87073e620f5b9c9ec069f0572846e8be2148078980ff2bf5d2dd599c8cafc28cb9a43df5e2a05aa085b17f28e35d3c2fa0dd7c30bd4b6c64ca21b4730cffc0e3e3c1dab6bab7b96dd87720", 0xa2}, {&(0x7f0000000040)="c3211b1a36f59a4e558c5215197d22b1d4d9c74e55536ec776d3a64df84ac0ef311edd55cf7fee7d070e68ca5a0a35b177ad865c", 0x34}], 0x3, 0x2) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0xb1d0, 0x0, 0x1, {0x0, r3}}, 0x10000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r4, 0x0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x5, 0x0, @fd, 0x0, 0x0, 0x0, 0x10, 0x0, {0x2}}, 0x80000001) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x1, 0x20010, r0, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000280)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0xbad649041ba9dfb3, @fd=r0, 0x5, 0x0, 0x0, 0x2, 0x1}, 0x81) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvmmsg(0xffffffffffffffff, &(0x7f0000004700)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/127, 0x7f}, {&(0x7f0000000500)=""/164, 0xa4}], 0x2, &(0x7f0000000600)=""/68, 0x44}, 0x101}, {{&(0x7f0000000680)=@nl, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000700)=""/81, 0x51}, {&(0x7f0000000780)=""/141, 0x8d}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/208, 0xd0}, {&(0x7f0000001940)=""/242, 0xf2}, {&(0x7f0000001a40)=""/96, 0x60}, {&(0x7f0000001ac0)}, {&(0x7f0000001b00)=""/14, 0xe}, {&(0x7f0000001b40)=""/172, 0xac}, {&(0x7f0000001d00)=""/157, 0x9d}], 0xa, &(0x7f0000001e80)=""/254, 0xfe}, 0xfffff001}, {{&(0x7f0000001f80)=@rc, 0x80, &(0x7f00000044c0)=[{&(0x7f0000002000)=""/139, 0x8b}, {&(0x7f00000020c0)=""/156, 0x9c}, {&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/235, 0xeb}, {&(0x7f0000001c80)=""/55, 0x37}, {&(0x7f0000004280)=""/158, 0x9e}, {&(0x7f0000004340)=""/148, 0x94}, {&(0x7f0000004400)=""/135, 0x87}], 0x9}, 0x8b5c6e24}, {{&(0x7f0000004580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004600)=""/49, 0x31}], 0x1, &(0x7f0000004680)=""/100, 0x64}, 0x80000001}], 0x4, 0x2, 0x0) r9 = syz_io_uring_complete(r6) sendmmsg$sock(r7, &(0x7f0000007a40)=[{{&(0x7f0000004800)=@can={0x1d, r8}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004880)="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", 0xfd}, {&(0x7f0000004980)="20c2ff9c9378a2fb66b4e3407b20f3f2d05509bdbc89c83b97fddd8b18fbee29edbf79ace186879e5374b3a09446fd2bc711ce021a4b0b4ce89e7a599946b76bea880f0839418063d379e95ad749c74b83d2d66d3bb7eae55b79908623fc02293bf9ed2068adc65f4a650041569fc4cf0f55bb575ace6da8d8e87c7ee8ce32d3e5942f177b531869bfdefde8bdeb59e4c4a6cf4130fa4d1e72137b07af4733dea0d9aadfc949807acec5fc271c08870365497a93e4e95d4d2d88b155f053d31481e45aa610a7833b24ed79fb7c0de2200b064a64", 0xd4}, {&(0x7f0000004a80)="619cea7a30b6dbfa3250a90186ba48abca6147e5e5e04b08e5cf78ddd2a7da43755f145785f6d545310df32f4d2298de012d6a0bfd8bf64a59499a66ec03a27348527840ed641854af37226802161b75973bce6bec298d178391cf460211afe58e8db0cfffe28e1a4277fd36ba6533893c610c69de2066159ee4720908616aadf6728ff273277647eb318aed5ff0b9b3a8e2e060775a5f28cbcbf492432e148e47d3e6d1cb866b3bf8e96379b1c72137bd10658b5cc5f9697fba", 0xba}, {&(0x7f0000004b40)}], 0x4}}, {{&(0x7f0000004bc0)=@pppol2tpin6={0x18, 0x1, {0x0, r9, 0x0, 0x1, 0x1, 0x1, {0xa, 0x4e23, 0x0, @local, 0x7}}}, 0x80, &(0x7f0000005c80)=[{&(0x7f0000004c40)="4705c8b8c9edcd23a7a0d188341cdb912ddcd03176a795c2998066", 0x1b}, {&(0x7f0000004c80)="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", 0x1000}], 0x2, &(0x7f0000005cc0)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}], 0x18}}, {{&(0x7f0000005d00)=@sco, 0x80, &(0x7f0000005f80)=[{&(0x7f0000005d80)="2b0665e1cc2228687b7fe97dd9b840869eb23f0f1b4cbd517c462d271bc8", 0x1e}, {&(0x7f0000005dc0)="7378d8f759adee66d568979c1652e07b4ff0a4f606787a8c4653a36d7ae05831f14e063ba356af6b5d2d35e0ddbac07abd51f353605dff25fd6ad8d83e4e44f273f899bcd7e6de35edbf9b19e71e8ec15be7cb412ff4d302a252d4a30bbabb3b0313755a0aff7a5d81a248980f7392b08294eed9a5cb93697bd7c4823ce30d26ef96961118e4da4d797998aba3687464d443b437aba12ddd81d93c564f492cf7d92e2aeb79908f3e72dd4692adebfd4681bed17197d682f6ef56832a08fb47bd6e338758551e03f0dd806da42f2b", 0xce}, {&(0x7f0000005ec0)="45a9206a03017f989311f6de87d1c8b0e358", 0x12}, {&(0x7f0000005f00)="84a666ae21ff6e07b63fe0dcca6cd966c1995944440ccde4399f04cc589cf06a20ac98117d227f64cfc78cdc4857d4fc36f7deae1ca7c69c1895631f30db51da3e18a9801599ba9fec477d377b16d7ec6e56884866c7655337346e76", 0x5c}], 0x4, &(0x7f0000005fc0)}}, {{&(0x7f0000006000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0x1, {0xa, 0x4e24, 0x7, @loopback, 0xffffffe1}}}, 0x80, &(0x7f0000007080)=[{&(0x7f0000006080)="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", 0x1000}], 0x1}}, {{&(0x7f00000070c0)=@isdn={0x22, 0x2, 0x40, 0x19}, 0x80, &(0x7f00000075c0)=[{&(0x7f0000007140)="d1ed410306979348aa8335bf69c7171a46f0a918f8823ce5c1d65c8dea0bba95608b6d41487364df94e25eb4be347b4d6bf354d08cab23", 0x37}, {&(0x7f0000007180)="db78259fe6d3aebab9b087f2e8a6b2ae98e7deb3f191edc6b1ac6682d3eb1e614e7ec877523be085bf7ff96858f71614a717784de682fbf6363e6d3ed0a36b1af1641dfa2b632a2cece9334d40f0663f262e8914c44eb1db8d1d9b443f00acdf196c0e2650096c890cc446198752948dfe5ecc4f3dd5da2a0a8733bdb25a44130d061a84f1d96a93fc66544d34318df47e1460fa428f1e876af7afab5bab773f6ac424ac56323122bb82cdf33194e6ec5f616eb40bce99cf9fd665690b853100354b3424b905eac555f62f08a46a3e735d69e3994bc3c50d02bd6a9b83de8a6c98e20eb5de91c351c1", 0xe9}, {&(0x7f0000007280)="92d6248ad10a3b6e44", 0x9}, {&(0x7f00000072c0)="9b43d3766e8e9686675d5ae509d3fe003d29c3ed424394f46182d9b7b34e207ba28d03f8ab561a86224aef10cfb2739880ab64eda28f042162a01168bb177edcfb1730521215d57462b74864a2f07e49862d0230c2c641dfc0c5fa4daa67b3941edc02", 0x63}, {&(0x7f0000007340)="a78631dd54fb0f697e19e869d16403a9a9c0be383cd8e95cba0e6caca2402089d3fc098f0e508795af553e4f8a3b44f937371225c56ba33a735a252886bfd29cc912f4264a9a686d3da312eb4bc07aafdbd884ae9f00183bc20d824f6a17a44d1f4f8e80007f6a4903f7018f36dd6538e1f14a3dcf2fa21d0a3330d56390599b6f94ffcdc9befca74ce8fbfb858f998176dd0e2863eb4d86e2d2ddbab99be4c92b2620c1fd1b215c414733352597eece9ea98c02c8005b", 0xb7}, {&(0x7f0000007400)="65db831e24d0df6f728132f5ee843b617fa825964155d94f458b11062a15a31cb1792ea0d3636561ae4cacccfe1ba3ec1d448a9432a6f8332820ebc3b10de3d31a13d9252ae8b01c57e665e02059216d44a5cfeae83866406d0f90458cfd3030c64eeca44f220bf73e87b08f13", 0x6d}, {&(0x7f0000007480)="8d6614fb37369d7b1382dcf4d3838ce594ab8d5adfaf13289b301ff1cfcd675f445876c7af38dbef417e3a0ee81a48cbc1ad308bc0268ef54593d5ef0a84c5cfd2c969f16a39da1dad5ad03d5445730d7f344de837a94beff764c1c0090db0079a852398c2e78feda85fc80c4d1a2eb6dfaaa7e03b11c0e1a1", 0x79}, {&(0x7f0000007500)="1e7fa99d55aaaeea30cbb58a878e7608eaba2ce11e999e311d1fced4f5c02781064689616494e3278862433dd9551a7eb9b4923d1ee943a875cbc172325441f098ed67646e4582c076f8ed366beabaf038f07e3f2ff1bbf923c92d5f908306f597b00e20fddd001b68bfdd119e319d192f40d5c3fb489e7a4102bf888a5c1f60f80095b0dc2a3b8f3454436d9850ef6ba692a5dd90beb827110caa00335be67ee551cc131297dc5021208ed4ee957dca588362853b469afc7e", 0xb9}], 0x8}}, {{0x0, 0x0, &(0x7f00000076c0)=[{&(0x7f0000007640)="78673330359212343569e74d2e816bbe4cc492317b7409897a3e35e3adbbab58d3049bb25d097091e26ee05d14bcd064fb7c67d5302144f5348bfa8414f2f9307a8bbe41a22b6a219017", 0x4a}], 0x1, &(0x7f0000007700)=[@mark={{0x14, 0x1, 0x24, 0x3f}}, @timestamping={{0x14, 0x1, 0x25, 0xfff}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0xcb3}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x200}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0xc0}}, {{&(0x7f00000077c0)=@sco, 0x80, &(0x7f0000007980)=[{&(0x7f0000007840)="2aeba8d09a95408f767ac0441f27e0678aa11e0df86905dc4d7938b2745489aac7c173b962598461b9a21d73fc80fc24ec482f4f92d1278b9e6aa1546c20dfdfd01b5204149c634a759b1c462a0aca0ff299b5f2b9441ced874a7fc3221b53ebcd0940d3201f1f978bc824e727ecbc0639d13de6ba53759d2479f0a72b0b318234e4982d1b5dda0647a898f97e21376256406126d5de107f872e3d2097907041c018b9486689b07edb5fe92f5eeb644f41f6977b8e34ae9f3263dcab2ea6e8f42e0f7b3b024e01e24ac2567fefd2b62a481e0c2fd8642f3d71bbaf5ff5", 0xdd}, {&(0x7f0000007940)="8c126dc89fdbc56227c6fb3162be3dadadb4ee077dd385fad64f19143e5960e72452e59fa1d3af613054bb7b", 0x2c}], 0x2, &(0x7f00000079c0)=[@timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}, @mark={{0x14, 0x1, 0x24, 0xfff}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0x60}}], 0x7, 0x40811) 02:42:28 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 584.856682] FAULT_INJECTION: forcing a failure. [ 584.856682] name failslab, interval 1, probability 0, space 0, times 0 [ 584.857949] CPU: 0 PID: 5826 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 584.858611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 584.859413] Call Trace: [ 584.859678] dump_stack+0x107/0x167 [ 584.860042] should_fail.cold+0x5/0xa [ 584.860431] should_failslab+0x5/0x20 [ 584.860808] __kmalloc_track_caller+0x79/0x370 [ 584.861254] ? simple_xattr_set+0x93/0x610 [ 584.861678] kstrdup+0x36/0x70 [ 584.862002] simple_xattr_set+0x93/0x610 [ 584.862411] ? kernfs_vfs_user_xattr_set+0x3f0/0x3f0 [ 584.862911] ? kernfs_vfs_user_xattr_set+0x3f0/0x3f0 [ 584.863396] kernfs_vfs_xattr_set+0x80/0xb0 [ 584.863793] __vfs_setxattr+0x10f/0x180 [ 584.864184] ? xattr_resolve_name+0x3e0/0x3e0 [ 584.864644] ? security_capable+0x95/0xc0 [ 584.865058] __vfs_setxattr_noperm+0x11a/0x4c0 [ 584.865509] __vfs_setxattr_locked+0x1c3/0x250 [ 584.865952] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 584.866474] vfs_setxattr+0xe8/0x270 [ 584.866849] ? __vfs_setxattr_locked+0x250/0x250 [ 584.867311] ? strcmp+0x69/0xb0 [ 584.867642] setxattr+0x23d/0x330 [ 584.867970] ? vfs_setxattr+0x270/0x270 [ 584.868372] ? filename_lookup+0x3c8/0x570 [ 584.868805] ? lock_acquire+0x197/0x470 [ 584.869197] ? path_setxattr+0xb5/0x190 [ 584.869593] ? lock_release+0x680/0x680 [ 584.869994] ? strncpy_from_user+0x9e/0x470 [ 584.870426] ? __mnt_want_write+0x196/0x280 [ 584.870870] path_setxattr+0x174/0x190 [ 584.871259] ? setxattr+0x330/0x330 [ 584.871616] ? __ia32_sys_read+0xb0/0xb0 [ 584.872031] __x64_sys_setxattr+0xc0/0x160 [ 584.872429] ? syscall_enter_from_user_mode+0x1d/0x50 [ 584.872935] do_syscall_64+0x33/0x40 [ 584.873297] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 584.873789] RIP: 0033:0x7efd311bab19 [ 584.874157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 584.875899] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 584.876649] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 584.877331] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 584.877972] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 584.878656] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002 [ 584.879297] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 02:42:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 11) [ 584.919429] FAULT_INJECTION: forcing a failure. [ 584.919429] name failslab, interval 1, probability 0, space 0, times 0 [ 584.920584] CPU: 0 PID: 5836 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 584.921233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 584.922001] Call Trace: [ 584.922244] dump_stack+0x107/0x167 [ 584.922607] should_fail.cold+0x5/0xa [ 584.922975] ? create_object.isra.0+0x3a/0xa20 [ 584.923411] should_failslab+0x5/0x20 [ 584.923769] kmem_cache_alloc+0x5b/0x310 [ 584.924162] create_object.isra.0+0x3a/0xa20 [ 584.924560] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 584.925042] __kmalloc_track_caller+0x177/0x370 [ 584.925476] ? simple_xattr_set+0x93/0x610 [ 584.925891] kstrdup+0x36/0x70 [ 584.926196] simple_xattr_set+0x93/0x610 [ 584.926587] ? kernfs_vfs_user_xattr_set+0x3f0/0x3f0 [ 584.927073] ? kernfs_vfs_user_xattr_set+0x3f0/0x3f0 [ 584.927553] kernfs_vfs_xattr_set+0x80/0xb0 [ 584.927965] __vfs_setxattr+0x10f/0x180 [ 584.928337] ? xattr_resolve_name+0x3e0/0x3e0 [ 584.928776] ? security_capable+0x95/0xc0 [ 584.929178] __vfs_setxattr_noperm+0x11a/0x4c0 [ 584.929594] __vfs_setxattr_locked+0x1c3/0x250 [ 584.930035] vfs_setxattr+0xe8/0x270 [ 584.930377] ? __vfs_setxattr_locked+0x250/0x250 [ 584.930844] setxattr+0x23d/0x330 [ 584.931155] ? vfs_setxattr+0x270/0x270 [ 584.931530] ? filename_lookup+0x3c8/0x570 [ 584.931918] ? lock_acquire+0x197/0x470 [ 584.932293] ? path_setxattr+0xb5/0x190 [ 584.932663] ? lock_release+0x680/0x680 [ 584.933058] ? strncpy_from_user+0x9e/0x470 [ 584.933454] ? __mnt_want_write+0x196/0x280 [ 584.933881] path_setxattr+0x174/0x190 [ 584.934233] ? setxattr+0x330/0x330 [ 584.934588] ? __ia32_sys_read+0xb0/0xb0 [ 584.934962] __x64_sys_setxattr+0xc0/0x160 [ 584.935360] ? syscall_enter_from_user_mode+0x1d/0x50 [ 584.935813] do_syscall_64+0x33/0x40 [ 584.936170] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 584.936624] RIP: 0033:0x7efd311bab19 [ 584.936977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 584.938553] RSP: 002b:00007efd2e730188 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 584.939276] RAX: ffffffffffffffda RBX: 00007efd312cdf60 RCX: 00007efd311bab19 [ 584.939957] RDX: 00000000200001c0 RSI: 0000000020000140 RDI: 00000000200000c0 [ 584.940627] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 584.941285] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002 [ 584.941951] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 [ 584.951932] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 584.958723] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:42:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:42:28 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:42:28 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="80773e254935824f95731ed6fa9214081246", @ANYRES16=r2, @ANYBLOB="0100fefffffffddbdf2521000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x6, 0x5, &(0x7f00000005c0)=[{&(0x7f00000001c0)="b12149604d84372daa50c4dd49a7cbacc217efa6daaea72c6b54799b22fb3a4a2c1c6a7d7e7290abb9c375e6dcbde164b68df4405362281999e50376f72220b36c1455e325eec88ae25183ce17b8fe033d88dc3827b5cc2ada88cd59650de5a2c14cf46ef56675ae3fe30b0f7f4ea90ccea9568ed7f881bfee85336e22248380eec9a3056c8b683d92b2d10291f12ee9323c858a8e3f390cc3e4935df58f99e883417557aeb684d987a92380133c1423244cd84be41b38a5ab81e021e37771ad4a635d2cf5554119c1c3abaa3f2485ba4440a142", 0xd4, 0x8}, {&(0x7f00000002c0)="f750f1d743a0229115b30aa03873ed", 0xf, 0x1}, {&(0x7f0000000300)="767da5ee5ad848937e4fec436e84305dcc4934d70807c1ba73ce00eefa", 0x1d, 0xc41c}, {&(0x7f0000000340)="0c778ad87a0a8aea6fc5a395e22c7bb1652bc9b4363a94aa1441bd621e14635b1bf4caa158f4c1e96b7cde0d9d659769f8f3238e0c11eec57d47950fcb8a36fcd1e8fd296e041189e45272ce8f3057056530105de714c54a46d424f4fe0c23fe20233bb8408c5ad62354e81b5b52d74ceabd106faeb0304b2fd084d58d67dd73e791d88c40a60cfea8f080f460966020792c2d471754c1f0a9078b3a8acfdc472c871dbefe2bdea997d2ccb807a574627e88bd7a589b2b5eb61af6daefcb066379d5d8b60d03d671c58d0c5a10aea8acc99ab86a4db8117f259261e0391bac37791000cd6cdc1d9384c26bc1362a54e20dc9cd", 0xf3, 0x400}, {&(0x7f0000000500)="11b94be43675d2ed19ce403baf476f52e8996e478b73390230b6dcdb098b53b698a779b332dc6aeefe6bbce33f8760935db0b0688507e360ffff96c3fe36550e6a279bf4ae378f6f92e1c2100fdd951947f93587c0af31a5f51ac629788b2c2176bc9bab7f01520c983141e2b5c3539684a9c5e67406fff999a443e7ca64a74b4375ecbc5060b5338f611d44a012f5729d17492ef6b5a8918a43e394dbe11836", 0xa0, 0xffffffff}], 0x1, &(0x7f0000000640)={[{@huge_within_size}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x2f, 0x2d, 0x38, 0x30, 0x2c, 0x37, 0x35, 0x32, 0x38, 0x2f]}}}}, {@nr_inodes}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@huge_always}, {@huge_within_size}], [{@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 02:42:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000280)) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020000000000000000000000000001fc00000000000000000000000000000000000000000000000000008d00000000", @ANYRESOCT, @ANYRES32, @ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)={0x0, 0x0}) setpgid(0x0, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write$binfmt_aout(r3, &(0x7f0000000b00)=ANY=[], 0x742) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x4, 0xf8, 0x30, 0xba, 0x0, 0x4, 0x80008, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, @perf_bp={&(0x7f0000000240), 0x7}, 0x8000, 0x9, 0x0, 0x5, 0x9, 0x1000, 0x4, 0x0, 0xffffff7f, 0x0, 0x2}, r2, 0x2, r3, 0x3) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0}, 0x0) r5 = msgget(0x3, 0x202) msgrcv(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000009006fe82620f90e524e45f800"/38], 0x26, 0x0, 0x3000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_GETSTATE(r6, 0x40046629, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0xbf, 0x1, 0x3f, 0x9, 0x0, 0x5, 0x222, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x7f, 0x7}, 0x24, 0x0, 0xa686, 0x2, 0x1, 0x200, 0x5, 0x0, 0x7, 0x0, 0x9}, 0x0, 0x1, r0, 0x3) msgsnd(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xeb, 0x800) sendmsg$NL80211_CMD_NEW_MPATH(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="ed87002f14ffc58390d925f4125a4d0b5c3f0e6b59bc588fb88ff59cd51cc9116f3b49cf5e3418d56a9b7d49747ca707773521f9a6bf51f07b0c8d9ff35c21a9da59f908d2d4c5be6be47891a51b4951642248f835bacac346d0778f094c948bcccbc4c44351b748a48cc8a20506f359ec5fab31b4f311e6a8d2209f", @ANYRES16, @ANYBLOB="0004ff7f0000ffdbdf2517000000"], 0x14}, 0x1, 0x0, 0x0, 0x81}, 0x10) ioctl$HIDIOCGFIELDINFO(r4, 0xc038480a, &(0x7f00000000c0)={0x3, 0x1, 0x6, 0x9, 0x2, 0xb248, 0x7fffffff, 0x67, 0x8, 0x1ff, 0x7, 0xbc7, 0x1, 0x6}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 02:42:28 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 585.058918] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 02:42:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) openat(r0, &(0x7f0000000300)='./file0/file0\x00', 0x401000, 0xd0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000400), 0x400) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x2) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000100)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) dup2(0xffffffffffffffff, r2) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)=""/127, 0x7f) openat(r1, &(0x7f0000000380)='./file1\x00', 0x20800, 0x1ab) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) sendfile(r0, r1, 0x0, 0x20d315) 02:42:28 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000001c0)}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:42:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) (fail_nth: 12) 02:42:28 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 585.181834] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 585.206416] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. [ 585.226328] FAULT_INJECTION: forcing a failure. [ 585.226328] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 585.228369] CPU: 1 PID: 5871 Comm: syz-executor.1 Not tainted 5.10.214 #1 [ 585.229379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 585.230584] Call Trace: [ 585.230979] dump_stack+0x107/0x167 [ 585.231516] should_fail.cold+0x5/0xa [ 585.232082] _copy_to_user+0x2e/0x180 [ 585.232653] simple_read_from_buffer+0xcc/0x160 [ 585.233341] proc_fail_nth_read+0x198/0x230 [ 585.233978] ? proc_sessionid_read+0x230/0x230 [ 585.234648] ? security_file_permission+0x24e/0x570 [ 585.235374] ? perf_trace_initcall_start+0x101/0x380 [ 585.236125] ? proc_sessionid_read+0x230/0x230 [ 585.236804] vfs_read+0x228/0x580 [ 585.237314] ksys_read+0x12d/0x260 [ 585.237840] ? vfs_write+0xa70/0xa70 [ 585.238395] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 585.239171] ? syscall_enter_from_user_mode+0x1d/0x50 [ 585.239934] do_syscall_64+0x33/0x40 [ 585.240488] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 585.241233] RIP: 0033:0x7efd3116d69c [ 585.241780] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 585.244450] RSP: 002b:00007efd2e730170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 585.245559] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efd3116d69c [ 585.246595] RDX: 000000000000000f RSI: 00007efd2e7301e0 RDI: 0000000000000004 [ 585.247631] RBP: 00007efd2e7301d0 R08: 0000000000000000 R09: 0000000000000000 [ 585.248679] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002 [ 585.249715] R13: 00007ffda2a7240f R14: 00007efd2e730300 R15: 0000000000022000 [ 585.265393] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 02:42:28 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:28 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000001c0)}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:42:28 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:42:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) sendmsg$NL80211_CMD_DEAUTHENTICATE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f00000000c0)=[{0x34, 0x0, 0x0, 0xffffffff}, {0x6, 0x0, 0x0, 0x7fffffff}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xeca, 0x3, 0x1, 0x1}, {0x7f, 0x17, 0x40, 0xfffff7f9}, {0xf6, 0x81, 0x1f, 0x8}, {0x8, 0x9, 0xc1, 0x4}]}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fallocate(r2, 0x11, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000000)) r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x0) ioctl$TCXONC(r4, 0x540a, 0x1) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r4, 0x8008f512, &(0x7f0000000200)) socket$inet_udplite(0x2, 0x2, 0x88) [ 585.321051] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:42:41 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:42:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:42:41 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000280)) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020000000000000000000000000001fc00000000000000000000000000000000000000000000000000008d00000000", @ANYRESOCT, @ANYRES32, @ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)={0x0, 0x0}) setpgid(0x0, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write$binfmt_aout(r3, &(0x7f0000000b00)=ANY=[], 0x742) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x4, 0xf8, 0x30, 0xba, 0x0, 0x4, 0x80008, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, @perf_bp={&(0x7f0000000240), 0x7}, 0x8000, 0x9, 0x0, 0x5, 0x9, 0x1000, 0x4, 0x0, 0xffffff7f, 0x0, 0x2}, r2, 0x2, r3, 0x3) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0}, 0x0) r5 = msgget(0x3, 0x202) msgrcv(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000009006fe82620f90e524e45f800"/38], 0x26, 0x0, 0x3000) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_GETSTATE(r6, 0x40046629, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0xbf, 0x1, 0x3f, 0x9, 0x0, 0x5, 0x222, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x7f, 0x7}, 0x24, 0x0, 0xa686, 0x2, 0x1, 0x200, 0x5, 0x0, 0x7, 0x0, 0x9}, 0x0, 0x1, r0, 0x3) msgsnd(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xeb, 0x800) sendmsg$NL80211_CMD_NEW_MPATH(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="ed87002f14ffc58390d925f4125a4d0b5c3f0e6b59bc588fb88ff59cd51cc9116f3b49cf5e3418d56a9b7d49747ca707773521f9a6bf51f07b0c8d9ff35c21a9da59f908d2d4c5be6be47891a51b4951642248f835bacac346d0778f094c948bcccbc4c44351b748a48cc8a20506f359ec5fab31b4f311e6a8d2209f", @ANYRES16, @ANYBLOB="0004ff7f0000ffdbdf2517000000"], 0x14}, 0x1, 0x0, 0x0, 0x81}, 0x10) ioctl$HIDIOCGFIELDINFO(r4, 0xc038480a, &(0x7f00000000c0)={0x3, 0x1, 0x6, 0x9, 0x2, 0xb248, 0x7fffffff, 0x67, 0x8, 0x1ff, 0x7, 0xbc7, 0x1, 0x6}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 02:42:41 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000001c0)}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:42:41 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:41 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:41 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x153) openat(r0, &(0x7f0000000300)='./file0/file0\x00', 0x401000, 0xd0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000400), 0x400) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x2) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000100)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) dup2(0xffffffffffffffff, r2) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)=""/127, 0x7f) openat(r1, &(0x7f0000000380)='./file1\x00', 0x20800, 0x1ab) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r4, 0xffff) sendfile(r0, r1, 0x0, 0x20d315) [ 598.354200] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.2'. 02:42:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) [ 598.384755] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 598.387542] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 598.393982] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:42:41 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:41 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:42:41 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:42:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x3, 0x0) 02:42:41 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:41 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 598.608130] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 598.618009] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 02:42:54 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:54 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000280)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000001c0)={'wg0\x00', 0xc7}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = dup3(r0, r1, 0x0) sendfile(r2, r1, &(0x7f0000000100)=0x800, 0xfff) setsockopt$inet6_opts(r2, 0x29, 0x36, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400d04e0000", @ANYRES16=0x0, @ANYBLOB="00000000104af85656003d000000"], 0x14}}, 0x20000844) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000200)) 02:42:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x200001c2, 0x0) 02:42:54 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:54 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:42:54 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:42:54 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:42:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:42:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x2) [ 611.577098] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 611.578857] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 02:42:54 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 611.673418] audit: type=1326 audit(1712630574.869:596): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5972 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x0 [ 611.678082] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 611.698833] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:43:09 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:43:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4, 0x20}}, './file0\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) ftruncate(0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fstat(r0, &(0x7f0000000240)) r2 = fcntl$dupfd(r1, 0x406, r0) openat(r2, &(0x7f0000000140)='./file0\x00', 0x8202, 0x84) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = dup2(r4, r3) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f00000003c0)=ANY=[@ANYBLOB="892258492f0f4bc6f23c4a65140f39e3c08a91e4aea63fdb46b1422eea8f3bfb6b34cfbcca950b837708d86aef49486f79febd882f8f71b9be438665c6523974f20c2cb0f2177c1962c5e62c7b771b76f77e908296b4695086dd3e1ab5d0686db79107cfa575f7e9520481e2fddbe86e636bbefab49ddaadea29a92c9a8d3d62e2ea54736bd3f270801eafac48c03a19e6b85ab7a18f1152b358122a7ddc142a8c85c943de63f8deacdd5b56c1ea62705f74a3b1811e0a83ba5bc43238bd5eee014331f0140114e04931"]) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/sem\x00', 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x40200, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 02:43:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:43:09 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x8) 02:43:09 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:09 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:09 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) fcntl$setstatus(r0, 0x4, 0x2000) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x6, 0x13, 0x86, 0x6, 0x0, 0x0, 0x2, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={0x0, 0x8}, 0x4940, 0x10000, 0x2, 0x8, 0xffffffff, 0x5, 0x101, 0x0, 0x9, 0x0, 0x9ff}, r1, 0x6, 0xffffffffffffffff, 0x0) gettid() setpriority(0x2, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0xa) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) [ 626.248321] audit: type=1326 audit(1712630589.443:597): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5991 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x0 02:43:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x80000) 02:43:09 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000200c000000000000000002000000080000000000", @ANYRES32=0x0, @ANYBLOB="0c0011000000000000000000"], 0x28}}, 0x0) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) perf_event_open(&(0x7f0000000440)={0x5, 0x9, 0x4, 0x1, 0x40, 0xff, 0x0, 0x6, 0x80080, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x10204, 0xffffffffffff97d8, 0x1ff, 0x7, 0x4, 0x6, 0x9, 0x0, 0xfff, 0x0, 0x100}, 0x0, 0xc, r2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000200)=0x3) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r4) keyctl$revoke(0x3, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') ioctl$TIOCGSERIAL(r5, 0x541e, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/182}) unshare(0x48020200) [ 626.387341] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 02:43:09 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 626.420500] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 626.473239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3104 sclass=netlink_route_socket pid=6022 comm=syz-executor.5 02:43:09 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:43:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x1000000) 02:43:09 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:09 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:09 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x2000000) [ 626.763100] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3104 sclass=netlink_route_socket pid=6035 comm=syz-executor.5 02:43:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x8cffffff) 02:43:24 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) timer_create(0x6, &(0x7f0000000080)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000100)={{r1, r2+10000000}, {r3, r4+10000000}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_settime(r0, 0x1, &(0x7f0000000180)={{0x77359400}, {0x77359400}}, &(0x7f0000000240)) r5 = clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) timer_create(0x1, &(0x7f0000000280)={0x0, 0x28, 0x1, @tid=r5}, &(0x7f00000002c0)) 02:43:24 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:24 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:43:24 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 641.594491] audit: type=1326 audit(1712630604.790:598): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6053 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x0 02:43:24 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:43:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6efd62e7", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf251d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c000600030000000000000008000300", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="0c0006000000000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f000004c440)={{0x0, 0x9, 0x8, 0x3b, 0xf3, 0x19f4, 0x1, 0x5, 0x81, 0x4, 0x6, 0x2, 0x3, 0x7, 0x8}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "7374bf600a2dbb0a10a4446998c60bc654676f080ecee8672b9b990319e9f34b4c45be9b1cbb8fbe1f4541599e2a8deeedad6067575d671432b4ba4028542704ab850b2cd326bd5a16431e3e06cbefba068d34f999e863befaed31fe2f898bdfe4043148f4d1cc27af274cc202dd9cd92b1891ba85c4048baa5cf0aa7a3d5dbef19adb89a7123a5c5cf1f42650df4c63aa25c0c5f606a072b8c1910206999409a39439cacd824f129adb4177e14f533050e77cfd6b9e760c12899b047feb4c8e5b746e5570db48fc8fafeccf98bad6d99a585091b403666ded97ce43cdf6dd1791052bc149861ea2585dfb28b538cc9fe6ffc5e07182615951fd668085ed124af574a07e3495491f19b1aa2a3b69028ccacd78524d988b224ab17ed905da0b840b4a9939e2af6efdf4221126075a8964d904883db014031e0924681a4ef3795071b256b75002a7df298c87c565b1d8a331e7d0c1000e1d707100917dfe107f87ebea9dca1b708b01cacf1c9f348c0d0fd64aa64193637c7169264d06f613c41be60f39b0cc9d813ae5fca2222832f86f2ae87e883efd48df36d16e6c1ca5c378f6ff0fbace91eb3099d744b16171fcc1ab7d5456392f0878ecf27e8caad7386663de490c3044eed7e7cb83e675716eda0cc09f219aadddd814c88048a7c6cefe69a79f2f7a234cfffbf19ac7a9f6ef59faf2776ac3d636904ec1bda09b1c9d8caeafa918983215d866f5cb6f1088e7e99a43425913d258a3dc8550fcbca3e0bec47503e24d709dd1fd1bb3cd92837d10387a0eebb98aab27950a2a66dc0b9bad3e4ef6393036d64949931ffe6479073790b3b885ac8563d4018e9227d644864c17f048daefbb192d15b56a2a440ad6d4ef5af2ac9904d8b69c64d2368928d7595594e6c3fd23229cb6aa80ec308301b1c94777900d34b1b3eea03dca765036a3f5351551affb585f22541074380b60ca062bf8a8a2324fe61ecad5733aec51e0c5ddc648280556b8a038b5816947b1637ef598cfd134cf9833d875fd23d22f5f74e74a4634d50a3ac908eed128f4297924296d95361b9504c08df4a0603eff93ee34bd45ed12e8d06b8f399fefef4ced732aad15b70f3e276101fa4b5a5c17435d0999b3345ccfe853c955e8b7927c7a171506b8e5b4de8a68cb5e80c3709a0e15643b5772d82d04859133e09fa8ab81ac042e67bc918f2847af14a4eb77c3fcac3132ec1af5a57d85acb9ce91d9d15019904396737ade63df938e6f054f8ee21e8994d45b0801ccd8ae8bda90128cb05eddd297d800412bc01fc5cfdfa9d473641fffc793b513da3f7565a27c4ff3678ac6f71560cc6cc95fb4d20f85b7934cb4a4f614182d331ab53b6a09ff47fc272b6c1f5aaca477bfdfed3fac942d639773b7a5656c526eb595d6fa9d301c425947f37088447cb4400c37750b76eb6c1f7933e43b27224c2fdc053e55125d00ab11428af674f58bd5c3ea1ce4762856afccbd37dd59a5e726f2e5e770bcc8372304fc2a33611234e3b0d411fcae8691e621b64581dc32b3d97c02920877b2c995018dcfff2da8687bc64332cffc3d355931561dc799d169f61d121f242dd3605e3fef8a46bf73998202d6a87671719896c61d729006104bdb7e926020f28260c75c2c754e5f073097d7031567e62cbfcbff541702cdaf498bbfe01e2948e6e164271ca4ab4df68a1569d29d3ce7029c0b58d2a1e6d179fa817ec9df17195c8b83a7a7508f18f0e3d07e8871f331d7a151bc11301c7dce402e6a5fda6f3096df2ddfeb48b3991e055c55d2a071ed66bf378e5c451f849cdbd7951cacad16d6b5734b71db866e77086bfab1797942633ec688d78bb2fccaae2b0e796b852b278bd4a4648d0811293e1bfe68e30b42eb27ac0a4e435e086b4cfeeb9fa539f0d800b6108e4c7b9d7237746770a3f3477646b7c9bfd2bc111679d40bffe221be492ba984df6cd4d7d8f9cbf7185e79804416be68d8a2bfa28e5bec4b57bf5f08eeecafabccd55744e49bb4a7dd1324908d91762b9884e7268d0bb6290be3b51091ae6ccf2ebbd4945dd7913bd38509a00ce38d955909bfa1f3740fc123a12e15b853b59b9b691460afdcda150d39e566a83eaa0c3b7bac9819bdbc7e0a620206be87ff2f8ea8091dbffa014d2f2eb919040a434cdeb3db68adf845d2ba751dc0e1ce4afd8672a5ecf0653b8c672c3265aa236a174185f4b4a291bda664bb79c13f8b6932a831385773898d194d2500b38fbfff8c4acafa5a80dfd3f1f906132885446f9f7ad787dbbdab593661ab1c255df879eaf4ca739deaa11379a5c6b650472257fa54b646b29ceb3dbe27e3584914f9f766bbbcc67abeffebb0df881a42b8671bba930b04d1d7710cc15d546ee69ad40e66f04eb28af8bd17b739e68ad75a239303fb97b18f8f08d2f95bdae0f245ebdfc3ecf555a6fd53f5a35af8b2dd016b227d209fc8323a7576e66a9913a0ad4f19d30d2b6f25ac8b5b6c762e2c68c76f9bd7818adbb3c9b194c09471482ec6898754469076b8674ab9e26b5977a0fa693160f18a01d2f2c362186ff75c205cec261d9e6c431ee672e4056b7e458ef02dca1167d09de5977210461758ed506290477a63c5af0698a1f4edf3bc569692bc9febd5fd641860dd34a6926af47ae7bdd3cce59a5b24b6944075e30ec2f2dbd043ebc57a39eaa5559bc4f21f08198e0daa2e8506b21160c8f9b629ad0e80d5e99e5cf4c4ceefb8d9fe5493ebcb066a647269fef2146f1ed55dac66974446e650e49db26ceb24c16c24885a2d2d011d11ec52d5b7a9c8096314d1dc7c992a1dee70be2fc0cc2d9fc94b0d02d479f6f4bfd3fa20df42568e27c0cea6caa1028d5dfbe6a9657053c06132387f9abfbaf93d9b335b69b168bf7fdaa0a44981dadc3358b50f1b24d390f8858d6775fa838388ff8a69b02bf446028485ba9e0c15731288c186b3cdf2fbc088f13f50e5eecc9b3a058d1369b7a254f11aa81a5fabd862bfd5226ce26e0199ef241badd55ba0d6087e9eb1661111a6afef1caf2bd54832bb5a3e8b864c8af220a8a115746c1646e78471ba2edb7c63fcff7f6be047a5f740525fbe5e259beee146dc2a609d3fd576e826ee1e4fce8ccbf75aa713514bda04ed4086cdd11a770cbe5782bca23f5f3ad8682609d5c5d4e5ca4e117d7423740b41081c6945b446223bb435c6ae2314552b7bf53a8b2c8a7a2a961d17315e0f7a660624b119c89ae81d2214b03cd79bc3eb355bf06811d7186b1f0a7219dd8d4096cb0df940719279357b853bc7c5bcf645aa65c12227859ce0851953fcefa6051f2a31e3666abde9ef1ece3eba658de696edf5d87a7d562dfe1f6bb9ac5e6773bc9069c732683715868cf14825345fb60665982549b9bb7c5b7d934ed0c4d136fa089f8459d473bf1ee678cf88c26f4f5ac681aa6dbe6ef78c26e7a3649ae0574f550f9fc64e8caa14586cbc43d8ec72a3170fc4f6c78fdbd40332c1f35adfc04be68a067f2c03325d624e21fa0e1fa6ea879caa84665bedefcd19759872824a0053a110af2b6099d8ea572b0c81cea39147bb2dca0eaefd4be8c3b59b98c27049f04ae5f3652ade0e1561238296d17979581b93d0ee26464fb5675b968cbc397558207fb1d5365f73994c0c8f2bcae0164e74d602a4856355b214af58b6357b2505779260ec73929eb4fe1047bbc2a125ff6c88718d2b8b8fb9c0d1cb1760748ffc5e4998dbaf8fad99df26b2eaf99bce2541d287b243d7b9cf0ecb25588d14c6228a6cb5413f48e3d07817d258c45ca0ab3494ca5b59f87abdf38e439b4a31d60d9474a52e465f36dd0cd56f00d4e5e563bfc6421b40a7522eb71894a698c19510fa7dc690b6b3f782d88e61ca635d5efd4c9c1725dbf24e0c8e246a2dc979e4750de8347687038f0441858bdf5a06bcba827d8d1327601943ca9fd004c121034fa6e1c8b9eff5da764961f5700eab97380e99b37f302239b528b36f5c9bbebaff25edae48fbe59dd272099af5c695a19b62f64485ba01ae8416c02f04360be933b8ba8a49c6c1188a78c3d36d0c61f61b4002bfeb669e29bbcb306f573528a749b085500c7649aea469fca867da4ca9eaecc75a70f41baeb80bf803402a9066dc1e8243192b78533e0ad590e14fd2bf2ce3ac943ade1fcefd247406785ee387d18e9afe8845481748fbadf4d081e01ecce50ef1fc5b457fa296b833d77390764e2af12f7930c6334476dc4cf45d9f272e364336810c11318bd0a95233005d66fe81a5708ae5fad8c7db17e6d97d2340651f7aa7a36e132a77a7a6206b36a95ccb5a48cb19bd3bb886ff0e77bc76653912149ca85895c4f80c373cbbd4305a91213e8ec5b7b18d8587d723c18f02854556aaaa540935eab2b7470a7c1c40c7e843ac1221a51e92eb05af2342fea7c853a46182c8384612aadb40145b95de565140003468eaca74b38bdf4dc640d0af80c3dd81747652c5fe15ffff8965a150a4ca6a9d9c91d067b4fac49b23cd2041dfdab22126c97d812b67ed638cc65d75d836bf439807cd7cd3cd0e6b30c81983e3f45a00282a14d401d81ac7c5544510dc7d157eeaa18b09df5ec949a22d7342b5b720b2a47251e995410f9b35d90824c1b19beb8575c9efe2aaa2a2011790a1099a924c01ca835fb7cc561eb2310a5331d4d9c4a9ee03a5f1364c17a7f4511c0c1b929c630cc110696f9e94b4107d0b75338fda2c5e0b8d46d19b98071e328f57debd56b4a0a9009913ac41518a08e6fa533edf20db0dc5eff43cd3ead623fc826ac03925490537d6b6a47f27031faa17f9852a3cb72d2088f33d35846a40758e60dab4b3980d032adc3e4faa61ff8aaea6b08bc9705cf097701e9af550fa43ec06c0ae2257927eebcbbbf4a05ad8097597943d6aed8a950ba32bc0d19827539019397e2fffa5f7379ffd7ec266f0c1cd947aab0c9e73c2796bd4c32fa0a0effbc84570efdebd3ac1eb57cc89cdbed91ed43a64cccfeba427a017a07d84acc850a45e2f26639598ed061ea81b60fb1873983591d446129ba8b27a4aef3311292017e3cbc00533824888ef80ef1a85c86a370dc11694d2f455e04ceb8811afa53aac77c65b38703d18167aedcc077c988dd9832ee1999a82c8752b921bceae484c19cee6828eef373c979b5c3f208080c8dcb38c53e384bebed6c41c3b9d6958bd2b952d82d17b262dbf30f90ab5c5d197ccee9f6b6525928b0100ffdeace644e159500495ff5a0ea7df7b9ab63617e3879818e25341e97d839beefdf248222cadd61a5d76b1ff34704bb78656afef7994904da269f973598217edc3be93157185aa15ef225f6471d7786a5e28d0f145b96566e101bf46723486867b9aa90f9eb4d1f5612d4950160c1504a367daf984"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r21}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x6, "e95834918c8e6d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {r6, r11}, {}, {}, {r22}], 0x6, "b9f5058cf15542"}) r23 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r23, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r24 = fcntl$dupfd(r23, 0x0, r1) sendmsg$nl_generic(r24, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x20, 0x5a, 0xc21, 0x0, 0x0, {}, [@typed={0xc, 0x4, 0x0, 0x0, @u64}]}, 0x20}}, 0x0) 02:43:24 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 641.650032] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 641.655680] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 02:43:24 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 641.684331] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 02:43:24 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 641.723117] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 641.735960] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:43:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0xf6ffffff) 02:43:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') readv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/3, 0x3}, {0x0}], 0x2) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x7, 0x5, 0x1f}) [ 641.874912] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 641.879323] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 02:43:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:43:39 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:39 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:39 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:43:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0xffffff8c) 02:43:39 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:39 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000280)) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc69de45660031e8d}, {@in=@empty, 0x0, 0x32}, @in=@multicast1, {}, {}, {0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x80, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)={0x0, 0x0}) setpgid(0x0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write$binfmt_aout(r2, &(0x7f0000000b00)=ANY=[], 0x742) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x4, 0xf8, 0x30, 0xba, 0x0, 0x4, 0x80008, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, @perf_bp={&(0x7f0000000240), 0x7}, 0x8000, 0x9, 0x0, 0x5, 0x9, 0x1000, 0x4, 0x0, 0xffffff7f, 0x0, 0x2}, r1, 0x2, r2, 0x3) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r3 = msgget(0x3, 0x202) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_GETSTATE(r4, 0x40046629, &(0x7f0000000200)) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x28040, 0x0) openat(r5, &(0x7f0000000080)='./file1\x00', 0x80, 0x55) msgsnd(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xeb, 0x800) 02:43:39 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3ca0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffc, 0x4}, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000280)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) vmsplice(r1, 0x0, 0x0, 0x5) r5 = syz_io_uring_setup(0x457e, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x1, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0), &(0x7f0000000180)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x1, 0x3, 0x0, 0x1, 0x0, 0x0, {0x0, r4}}, 0x3) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000009, 0x12, r5, 0x8000000) syz_io_uring_submit(r8, r6, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r7}}, 0x7) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000140)=@IORING_OP_FADVISE={0x18, 0x2, 0x0, @fd_index=0x5, 0x4, 0x0, 0x4, 0x3, 0x1, {0x0, r9}}, 0xd2b) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x10000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r10, 0x0, 0x0) r11 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x13, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r11, r3, &(0x7f00000002c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x1}, 0x80000001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0x3, 0x9, 0xb7, 0x100000001}) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 656.152949] audit: type=1326 audit(1712630619.349:599): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 656.161318] audit: type=1326 audit(1712630619.357:600): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 656.168445] audit: type=1326 audit(1712630619.363:601): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 656.184400] audit: type=1326 audit(1712630619.364:602): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 656.187730] audit: type=1326 audit(1712630619.364:603): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 656.192024] audit: type=1326 audit(1712630619.370:604): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 656.198331] audit: type=1326 audit(1712630619.370:605): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:43:39 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0xfffffff6) 02:43:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) [ 656.331832] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 656.358033] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 656.377492] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 656.389278] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 656.399894] audit: type=1326 audit(1712630619.596:606): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6138 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 656.409428] audit: type=1326 audit(1712630619.605:607): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6138 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 656.435695] audit: type=1326 audit(1712630619.630:608): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6138 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:43:39 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:39 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:43:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x6) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xa0743, 0x88) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) r4 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, r0}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x9, 0x3, &(0x7f0000000400)=[{&(0x7f0000000280)="8bca08f4e49c1a52182192debd66a2db3af61b9ff11c8b0cbeb00ca49f6f", 0x1e, 0x5}, {&(0x7f0000000340)="73a7aca9f65ee8413cf08965e1dca3ded9270dab78a657a58a375635b11bdc6e861db4acaad6fa750e4e7cba64336bb55845db48c8b01c91f5fcc8", 0x3b, 0x8}, {&(0x7f0000000380)="bf2b3eb0808fee2fcbb6fd05cf31f7f1bf11d187430c77e9e9211e927e194c28568fc247caa7e4b02e46e55639d125200824648a07f3061e6192c0e1c6f22d86507f83e94731c709", 0x48, 0xe82}], 0x4020, &(0x7f0000000640)=ANY=[@ANYBLOB="756e695f786c6174653d312c73686f72746e616d653d77696e39352c6e6e6f6e756d74e1696c3d312c73686872746e615e0b3a28e0cbb2282c756e695f786c6174653d312c74656275672c73686f72746e616d653d77696e6e742c6e6f6e756d7461696c3d302c61707072616973655f747970653d696d617369672c736d61636b6673726f6f743d872d2c00db883c413870047b9daf31ad0a2b79f56b8f2d60d93dcc6e11330496ec69b736e3b9b9b115d60aae6cebb06a144a5355dbb986012d21e56bf0a735cdebe0f042b1a1c401f2ba9ecb1db280c9f33eefe77302220eec8f26942b00291ae8b58ea4d02c842275"]) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x4e, 0x1, 0x6, "390a38c4925d75d7901b9bd5522a28c7", "a9ebdca6282ecb8d7319c632e73ab8695be892fe6367bbf744370ac46859ca61281dcf7f68ef526222e1c4b4e42e9d98c68238fbe380d12f13"}, 0x4e, 0x1) io_uring_enter(r4, 0x58ab, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f00007fd000/0x800000)=nil, 0x800000, 0x1000001, 0x8010, r2, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x1) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r4, 0xf50f, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:43:39 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:39 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:43:39 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x8000000000000) 02:43:39 executing program 0: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:39 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:43:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) [ 670.886053] kauditd_printk_skb: 18 callbacks suppressed [ 670.886072] audit: type=1326 audit(1712630634.082:627): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6187 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 670.905474] audit: type=1326 audit(1712630634.097:628): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6187 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 670.908758] audit: type=1326 audit(1712630634.098:629): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6187 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:43:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000280)={@loopback, @mcast2, @mcast1, 0x2, 0x5, 0x0, 0x100, 0x8, 0x80, r2}) setsockopt$inet6_tcp_int(r3, 0x6, 0x3, &(0x7f0000000180)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = dup2(r0, r3) accept4$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) openat(r4, &(0x7f0000000000)='./file0\x00', 0xc0, 0x50) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000100)=0x8, 0x4) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, r5, 0x10000000) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) 02:43:54 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:43:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x100000000000000) 02:43:54 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:54 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) [ 670.929328] audit: type=1326 audit(1712630634.098:630): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6187 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 670.943919] audit: type=1326 audit(1712630634.098:631): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6187 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:43:54 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, 0x0, 0x298840, 0x40) close(r0) clone3(0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x20040, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) chroot(&(0x7f0000000240)='./file0\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) socket$nl_route(0x10, 0x3, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$dir(0xffffffffffffff9c, 0x0, 0x280000, 0x46) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x40, 0x131) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x406, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x0, 0x100000000}) [ 670.963351] audit: type=1326 audit(1712630634.112:632): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6187 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 670.963477] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 670.968519] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 670.970368] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 670.974265] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 670.977139] audit: type=1326 audit(1712630634.112:633): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6187 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:43:54 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 671.008643] audit: type=1400 audit(1712630634.204:634): avc: denied { execmod } for pid=6191 comm="syz-executor.5" path="/syzkaller-testdir111469930/syzkaller.wDkmbl/72/file0" dev="sda" ino=16010 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=1 02:43:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:43:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:43:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x200000000000000) [ 671.085663] audit: type=1326 audit(1712630634.281:635): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6217 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 671.091278] audit: type=1326 audit(1712630634.286:636): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6217 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:44:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x200000000000000) 02:44:08 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x8cffffff00000000) 02:44:08 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:44:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:44:08 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:44:08 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 685.834599] kauditd_printk_skb: 8 callbacks suppressed [ 685.834617] audit: type=1326 audit(1712630649.030:645): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6241 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 685.845148] audit: type=1326 audit(1712630649.040:646): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6241 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 685.847946] audit: type=1326 audit(1712630649.042:647): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6241 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 685.853819] audit: type=1326 audit(1712630649.042:648): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6241 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 685.861633] audit: type=1326 audit(1712630649.042:649): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6241 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:44:09 executing program 5: ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f0000000100)={0x4a, 0x8, '\x00', 0x1, &(0x7f00000000c0)=[0x0]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x2, 0x0, 0x0, 0x4e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file2\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file2', [{0x20, '/dev/full\x00'}, {0x20, 'mptcp_pm\x00'}, {0x20, '/dev/full\x00'}, {0x20, '/dev/full\x00'}, {0x20, 'mptcp_pm\x00'}, {0x20, '#))]\''}, {0x20, '^^&/)\'(^#/'}, {0x20, '/dev/full\x00'}, {0x20, 'mptcp_pm\x00'}]}, 0x66) openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x602300, 0x0) close(r0) [ 685.877279] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 685.885371] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 685.888059] audit: type=1326 audit(1712630649.043:650): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6241 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:44:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) [ 685.922906] audit: type=1326 audit(1712630649.054:651): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6241 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 685.939819] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 685.944492] audit: type=1326 audit(1712630649.054:652): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6241 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 685.949777] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 02:44:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0xf6ffffff00000000) [ 685.987903] audit: type=1326 audit(1712630649.129:653): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6259 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:44:09 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 686.027303] audit: type=1326 audit(1712630649.129:654): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6259 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:44:09 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) writev(r3, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CLOSE={0x13, 0x4, 0x0, r0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000000, 0x12, r0, 0x10000000) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x6000, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 02:44:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:44:09 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:44:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:44:31 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004e8c0)={0x0, [], 0xd9, "90af9a99402657"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000300)=ANY=[@ANYRES64=0x0, @ANYBLOB="3f000000000000003f00000000000000050000000000000006000000000000000000000000000000ff07000000000000020000003f000000ff07000000000000d9342573d0ccde8238e57781f2f9e42842129c25a1dc241bcb0a2ae8e2d755d478a9c78dc92a13e5d20f6975abab30a6b5a863d173621450a3bd452472bd1eef0805970c22005f715207f12cdeeb17d95a65a3ca4adbfa9eec05b464ec2f4dd3b8e10c4238ffbc2b6727f02c3202a64effd53b32626b03fa5bd557cfea3264bdac33864f1cbc70b81a7d33a26008b76439d7b72e2b70449061b02df712216acc293f07473e97cd1394e0618dec691ea89e9fb906521571dcbb252f30f826125a72022f881000bf7a18"]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}], 0x0, "e6a2e51d013042"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000001940)=[{&(0x7f0000000240)}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/232, 0xe8}, {&(0x7f0000000600)=""/254, 0xfe}, {&(0x7f0000000700)=""/134, 0x86}, {&(0x7f00000007c0)=""/115, 0x73}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x7) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="000000000000b5653450a205b4758200"]) syz_io_uring_setup(0x7f02, &(0x7f0000000240)={0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f00000000c0)) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x76d2, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r4, r3, 0x0) 02:44:31 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:44:31 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:44:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0xffffffff00000000) 02:44:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:31 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:31 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 708.232999] kauditd_printk_skb: 12 callbacks suppressed [ 708.233018] audit: type=1326 audit(1712630671.429:667): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6290 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 708.245680] audit: type=1326 audit(1712630671.441:668): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6290 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 708.254936] audit: type=1326 audit(1712630671.447:669): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6290 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 708.274888] audit: type=1326 audit(1712630671.448:670): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6290 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 708.294723] audit: type=1326 audit(1712630671.455:671): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6290 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 708.322995] audit: type=1326 audit(1712630671.456:672): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6290 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 708.327743] audit: type=1326 audit(1712630671.460:673): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6290 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:44:31 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x400, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$NS_GET_OWNER_UID(r2, 0xb704, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_test', 0x122902, 0x0) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000180)="647732419e007299a0527d51dc496437e692665510d40d35b770fd8d702d121d997dc90d08763cc1ed88ba0f538cb17d600a", 0x32}], 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r1}}, {@posixacl}, {@loose}, {@version_u}, {@dfltgid}, {@version_9p2000}], [{@fowner_eq}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) fcntl$getownex(r4, 0x10, &(0x7f0000000380)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0xc, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 708.337915] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 708.338169] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 708.340793] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 02:44:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:44:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:31 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fcntl$dupfd(r0, 0x406, r1) [ 708.403845] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:44:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x2) ftruncate(r0, 0x1000003) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = dup2(r1, r1) write$binfmt_elf64(r4, &(0x7f0000000800)=ANY=[@ANYBLOB="7f45ec8ab26827704b3500000001000003003e0000180000bd0300000000000040000000000000001e0300000000000006000000000238000100321f0008000100000070030000000500000000000000ff00000000000000a000000000000000010100000000000003000000000000001f000000000000005563cd9a58df47eb7fe1862c4d6716e03dda73ad79bdf1e9a003bcf3986c50d4e8aa28c957fb3d2f3a377ec19cccee4be2003b4f8551fca880d37a4b11600af6227109e9493fb7702e12a94b4c79f400000000000000000000000000000000000000000000000000fd490000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e100000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b384c5f2024997ba0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ca824ebda0c84196749bba61a02d950ed03c31d36ce1ad9b4e7c056a3acd9feb813360802486d4efed4d530e585bc699f4d6b47ba7bc9a9c3d8c2e2fe03cb819116f5af1dca9ec7b1d75cfb61da8d2544524a9434a1c795c00000000"], 0x3c7) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4a6c80) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000040)=[r2, r3, r4, r1, r5, 0xffffffffffffffff, r6, r1], 0x8) fcntl$addseals(r2, 0x409, 0x8) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r7, 0x0, 0x2) r8 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x6, 0x4, 0x4, 0x0, 0x0, 0x3d9, 0x70ca0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7ff80, 0x1, @perf_bp={&(0x7f0000000100), 0xc}, 0x41200, 0x9, 0x3, 0x5, 0x6, 0x7, 0xabb, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x8, r0, 0x0) copy_file_range(r8, 0x0, r7, 0x0, 0x200f5ef, 0x0) 02:44:31 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 708.444256] SELinux: duplicate or incompatible mount options [ 708.454158] audit: type=1326 audit(1712630671.650:674): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6322 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 708.461952] audit: type=1326 audit(1712630671.658:675): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6322 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 708.466923] audit: type=1326 audit(1712630671.662:676): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6322 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:44:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x200f5ef, 0x0) 02:44:31 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:31 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 708.659940] SELinux: duplicate or incompatible mount options 02:44:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) 02:44:31 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:44:31 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 708.876338] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 708.893752] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:44:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) 02:44:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x20441, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x4) ioctl$TCXONC(r1, 0x540a, 0x1) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000)={0xfda3, 0x0, 0x8, 0x7}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2100, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) 02:44:47 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:44:47 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:47 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:48 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x13, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x77359400}, 0x1, 0x1, 0x1}, 0x3) fstatfs(r0, &(0x7f0000000200)=""/117) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:44:48 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 724.816169] kauditd_printk_skb: 22 callbacks suppressed [ 724.816189] audit: type=1326 audit(1712630688.012:699): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6363 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 724.831673] audit: type=1326 audit(1712630688.014:700): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6363 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 724.841911] audit: type=1326 audit(1712630688.014:701): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6363 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 724.847373] audit: type=1326 audit(1712630688.015:702): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6363 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 724.851012] audit: type=1326 audit(1712630688.015:703): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6363 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 724.855573] audit: type=1326 audit(1712630688.015:704): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6363 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 724.859558] audit: type=1326 audit(1712630688.016:705): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6363 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:44:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) 02:44:48 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x10d142, 0x62) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653120e4c9e0b3a32f6465762f6e754c6c00202f6465762f6e756c6c00202f6465762f6e756cafba9a2eb47586efe4b8b5c30642a3f49615ef1d26884796f0a546d9e2413fac83c66b88bf82519d7562a03bdc8ba3a49e430e03009a537efdfb4a94b87a19a8f0aed649a49885a27c6e9eabd1c3e9706d23472258514ba2456b0000a51845ed7ed6c413b23d8d2e67afff49149125a3d8a91d6d5bd71916d69b11558870bffdd74b2383789221e2a2"], 0x8b) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r3, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3e6, 0x1, &(0x7f0000000140)=[{&(0x7f0000000340)="fa1db67e31a4e2bb35898d234ee3316a10e7875f52194db88ce809bd8cdaf05bf53716ca485a7d108ab7c99e710202b167682368741719be229ffe9e1b4fede71f00786e2bcf755881a6c3cbf1b39f20f7d349a8f1d7266901c14331a379643a67deff5ed57804e6e05bd4d4993ae71762dbe00cb1f3088696af9d5b8aad71193c7ccf3e1b022cc651a18bc5cf6f", 0x8e, 0x3}], 0x1002080, &(0x7f0000000240)={[{@uni_xlateno}, {@fat=@umask={'umask', 0x3d, 0x2}}, {@shortname_lower}], [{@fowner_eq={'fowner', 0x3d, r3}}]}) stat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000540)) preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/77, 0x4d}, {0x0}], 0x2, 0x2, 0x1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r4, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x100800, &(0x7f00000007c0)={[{@mode={'mode', 0x3d, 0x7}}, {@huge_advise}], [{@fowner_gt}, {@euid_eq={'euid', 0x3d, r3}}, {@hash}, {@appraise_type}, {@smackfstransmute={'smackfstransmute', 0x3d, 'shortname=lower'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-#{'}}, {@fowner_lt={'fowner<', r4}}, {@subj_user}, {@smackfsroot={'smackfsroot', 0x3d, '#%,,'}}]}) fallocate(r2, 0x0, 0x0, 0x8800000) lseek(r1, 0x0, 0x3) write$binfmt_elf64(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="7f454c4600800007020000000000000000003d0056530000a8030000000000004000008400000000000000000000000001000000ff07380001002000dd050000ae22ff4ac6d2000000003b9841b395d4da51af26003b83c706e1248f495bc2737c51bcb40d92eaafd11f4fc6820454631db04b23aebe2d3ae43f9b5440db6cebd0873475d9aaa96e428529dcaa32e0465a5bb8ff88e614f2b913dde50222ca99700f1691d5ebe7dd717bf6858fdfcc5ac4ff12f5544f291164c40195606afed4fe168779edf43dca83d4fbd97b4e9e1ce211f276d7c24ccfc418"], 0xbb) r5 = fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0xfffffffd, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat(r5, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r6, 0x0, 0x100000001) [ 725.017087] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 725.038009] audit: type=1326 audit(1712630688.232:706): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6389 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 725.055174] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 725.057753] audit: type=1326 audit(1712630688.253:707): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6389 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 725.070871] audit: type=1326 audit(1712630688.266:708): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6389 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 725.086945] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 02:44:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x98, 0x0, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x8, 0xfffffffb, 0x0, 0x0, 0x8da, 0x0, 0x0, 0x8000000, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x1e) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) [ 725.100804] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:44:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:48 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:44:48 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 02:44:48 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:45:01 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:01 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:45:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:01 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x0, 0xfffffffe) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="d58ef407b00de15d110c2353bbe4facdffbe3f62defa85c1e218851dbf910078edc0bba72f60bfcc08218f096d962bb2e505c9b08bfc8954e2aa661ca036cb590290121fcb56e3359d78cccafa96bf"]) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffff, 0xc8a, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB=' \"! \n\x00\x00\x00\b\x00\x00\x00\x00\x00\x00'], 0xf) fallocate(r1, 0x3, 0x0, 0x18000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x3, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRESOCT=r3]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 02:45:01 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:45:01 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:01 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 1) 02:45:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 738.706154] kauditd_printk_skb: 11 callbacks suppressed [ 738.706167] audit: type=1326 audit(1712630701.902:720): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6431 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 738.711855] audit: type=1326 audit(1712630701.902:721): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6431 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 738.722252] audit: type=1326 audit(1712630701.917:722): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6431 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 738.724332] audit: type=1326 audit(1712630701.918:723): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6431 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 738.734593] FAULT_INJECTION: forcing a failure. [ 738.734593] name failslab, interval 1, probability 0, space 0, times 0 [ 738.735688] CPU: 0 PID: 6437 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 738.736304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 738.737054] Call Trace: [ 738.737303] dump_stack+0x107/0x167 [ 738.737641] should_fail.cold+0x5/0xa [ 738.737995] ? audit_log_start.part.0+0x27e/0x730 [ 738.738449] should_failslab+0x5/0x20 [ 738.738801] kmem_cache_alloc+0x5b/0x310 [ 738.739180] audit_log_start.part.0+0x27e/0x730 [ 738.739607] ? audit_log_task_context+0x170/0x170 [ 738.740048] ? audit_filter+0x5d6/0xb10 [ 738.740420] ? __bpf_prog_run64+0xe0/0xe0 [ 738.740802] ? audit_compare_dname_path+0x120/0x120 [ 738.741262] ? perf_trace_lock+0xac/0x490 [ 738.741654] audit_log_start+0x5f/0x90 [ 738.742018] audit_seccomp+0x5d/0x200 [ 738.742373] ? lock_downgrade+0x6d0/0x6d0 [ 738.742757] __seccomp_filter+0x669/0x1530 [ 738.743146] ? seccomp_notify_ioctl+0xda0/0xda0 [ 738.743582] ? __mutex_unlock_slowpath+0xe1/0x600 [ 738.744029] ? wait_for_completion_io+0x270/0x270 [ 738.744480] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 738.744904] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 738.745404] ? ksys_write+0x1a9/0x260 [ 738.745758] __secure_computing+0x191/0x2f0 [ 738.746161] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 738.746663] do_syscall_64+0xf/0x40 [ 738.747001] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 738.747473] RIP: 0033:0x7f5b4d031b19 [ 738.747821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 738.749499] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 738.750204] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 738.750864] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 738.751518] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 738.752176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 738.752835] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 [ 738.753530] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 738.754152] audit: out of memory in audit_log_start [ 738.755963] audit: type=1326 audit(1712630701.918:724): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6431 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 738.761611] audit: type=1326 audit(1712630701.922:725): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6431 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:45:01 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 738.803619] audit: type=1326 audit(1712630701.923:726): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6431 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 738.817101] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 738.820913] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 738.824672] audit: type=1326 audit(1712630701.923:727): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6431 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 738.827405] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 738.830696] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 738.856051] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 738.869604] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 02:45:16 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000040), 0xffffffffffffffce, 0x4001) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)=0x2000400) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x541a, &(0x7f0000000080)) 02:45:16 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000000)=0x80) r1 = open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000)={0x0, 0x0, 0x0}, &(0x7f0000001040)=0xc) getgroups(0x9, &(0x7f0000001080)=[0x0, 0xee01, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff]) setxattr$system_posix_acl(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0xee01, @ANYBLOB="040002000000000008000600", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=0xee00, @ANYBLOB="08000500", @ANYRES32=r2, @ANYBLOB="0800a0a8", @ANYRES32=0xee01, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08302c269f09f1f8c76a000300", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="10000400000000002000010000000000"], 0x84, 0x2) recvmmsg$unix(r0, &(0x7f00000040c0)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000880)=""/233, 0xe9}, {&(0x7f0000000980)=""/251, 0xfb}, {&(0x7f0000000a80)=""/155, 0x9b}, {&(0x7f0000000b40)=""/214, 0xd6}, {&(0x7f0000000c40)=""/211, 0xd3}, {&(0x7f0000000d40)=""/74, 0x4a}, {&(0x7f0000000dc0)=""/59, 0x3b}, {&(0x7f0000000e00)=""/38, 0x26}], 0x8, &(0x7f0000000ec0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000000f00)=@abs, 0x6e, &(0x7f0000001140)=[{&(0x7f0000000f80)=""/119, 0x77}, {&(0x7f0000001000)=""/36, 0x24}, {&(0x7f0000001040)}, {&(0x7f0000001080)=""/180, 0xb4}], 0x4, &(0x7f0000001180)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}}, {{&(0x7f0000001280), 0x6e, &(0x7f0000002540)=[{&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/12, 0xc}, {&(0x7f0000002340)=""/153, 0x99}, {&(0x7f0000002400)=""/119, 0x77}, {&(0x7f0000002480)=""/176, 0xb0}], 0x5, &(0x7f00000025c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000002600)=@abs, 0x6e, &(0x7f0000002840)=[{&(0x7f0000002680)=""/149, 0x95}, {&(0x7f0000002740)=""/225, 0xe1}], 0x2, &(0x7f0000002880)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000002940), 0x6e, &(0x7f0000002a40)=[{&(0x7f00000029c0)=""/11, 0xb}, {&(0x7f0000002a00)=""/56, 0x38}], 0x2}}, {{0x0, 0x0, &(0x7f0000003e40)=[{&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/231, 0xe7}, {&(0x7f0000003b80)=""/240, 0xf0}, {&(0x7f0000003c80)=""/181, 0xb5}, {&(0x7f0000003d40)=""/199, 0xc7}], 0x5, &(0x7f0000003ec0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000003f00)=""/119, 0x77}, {&(0x7f0000003f80)=""/125, 0x7d}], 0x2, &(0x7f0000004040)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}], 0x7, 0x40010040, &(0x7f0000004280)={0x0, 0x989680}) r5 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) mknodat$loop(r5, &(0x7f0000000300)='./file0\x00', 0x1000, 0x0) openat(r5, &(0x7f0000000140)='./file0\x00', 0x2, 0x0) openat(r5, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000001000)={0x0, 0x0, 0x0}, &(0x7f0000001040)=0xc) getgroups(0x9, &(0x7f0000001080)=[0x0, 0xee01, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff]) setxattr$system_posix_acl(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="02000000010000000000000002000400", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0xee01, @ANYBLOB="040002000000000008000600", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=0xee00, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="0800a0a8", @ANYRES32=0xee01, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08302c269f09f1f8c76a000300", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="10000400000000002000010000000000"], 0x84, 0x2) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f00000042c0)={{}, {0x1, 0x2}, [{0x2, 0x4}, {0x2, 0x0, 0xee00}, {0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x4}, {0x2, 0x3}, {0x2, 0x7}, {}, {0x2, 0x5}, {0x2, 0x4}], {0x4, 0x3bfbb02a669bbdc0}, [{0x8, 0x1}, {0x8, 0x6}, {0x8, 0x2, 0xee01}, {0x8, 0x8, 0xee00}, {0x8, 0x4, r2}, {0x8, 0x7, r4}, {0x8, 0x0, r6}], {0x10, 0x2}, {0x20, 0x6}}, 0xa4, 0x1) r8 = mq_open(&(0x7f0000000100)='y\x00', 0x800, 0x63, &(0x7f0000000180)={0x5, 0xffffffff, 0x1f, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000280)={{0x1, 0x1, 0x18, r8, {0x6}}, './file0\x00'}) 02:45:16 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:45:16 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 2) 02:45:17 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:45:17 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 753.837714] kauditd_printk_skb: 7 callbacks suppressed [ 753.837734] audit: type=1326 audit(1712630717.033:735): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 753.857167] audit: type=1326 audit(1712630717.053:736): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 753.867200] audit: type=1326 audit(1712630717.061:737): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 753.876456] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 753.877910] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 753.879654] FAULT_INJECTION: forcing a failure. [ 753.879654] name failslab, interval 1, probability 0, space 0, times 0 [ 753.881417] CPU: 0 PID: 6474 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 753.882471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 753.883730] Call Trace: [ 753.884142] dump_stack+0x107/0x167 [ 753.884711] should_fail.cold+0x5/0xa [ 753.885302] ? create_object.isra.0+0x3a/0xa20 [ 753.886008] should_failslab+0x5/0x20 [ 753.886610] kmem_cache_alloc+0x5b/0x310 [ 753.887238] ? auditd_test_task+0x11e/0x300 [ 753.887909] create_object.isra.0+0x3a/0xa20 [ 753.888600] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 753.889392] kmem_cache_alloc+0x159/0x310 [ 753.890046] audit_log_start.part.0+0x27e/0x730 [ 753.890787] ? audit_log_task_context+0x170/0x170 [ 753.891526] ? audit_filter+0x5d6/0xb10 [ 753.892146] ? __bpf_prog_run64+0xe0/0xe0 [ 753.892790] ? audit_compare_dname_path+0x120/0x120 [ 753.893566] ? perf_trace_lock+0xac/0x490 [ 753.894214] audit_log_start+0x5f/0x90 [ 753.894831] audit_seccomp+0x5d/0x200 [ 753.895417] ? lock_downgrade+0x6d0/0x6d0 [ 753.896067] __seccomp_filter+0x669/0x1530 [ 753.896726] ? seccomp_notify_ioctl+0xda0/0xda0 [ 753.897450] ? __mutex_unlock_slowpath+0xe1/0x600 [ 753.898179] ? wait_for_completion_io+0x270/0x270 [ 753.898892] ? fput_many+0x2f/0x1a0 [ 753.899462] ? ksys_write+0x1a9/0x260 [ 753.900051] __secure_computing+0x191/0x2f0 [ 753.900716] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 753.901534] do_syscall_64+0xf/0x40 [ 753.902093] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 753.902930] RIP: 0033:0x7f5b4d031b19 [ 753.903497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 753.906287] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 753.907457] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 753.908549] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 753.909631] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 753.910725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 753.911806] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 [ 753.928019] audit: type=1326 audit(1712630717.061:738): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 753.930028] audit: type=1326 audit(1712630717.062:739): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 753.931854] audit: type=1326 audit(1712630717.062:740): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4cfe4a04 code=0x7ffc0000 02:45:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 753.954873] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 753.989364] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 754.003426] audit: type=1326 audit(1712630717.075:741): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 [ 754.011654] audit: type=1326 audit(1712630717.110:742): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 754.026099] audit: type=1326 audit(1712630717.110:743): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5b4cfe469c code=0x7ffc0000 [ 754.030323] audit: type=1326 audit(1712630717.110:744): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6468 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 02:45:31 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:45:31 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:31 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:31 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:31 executing program 1: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0xfffffffffffffeeb, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}, 0x0, 0x0, 0x1ff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x5, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000200)=""/205, 0xcd) open(0x0, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, &(0x7f0000000180)={0x1, 0xc2d, 0x7fff}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) lseek(r0, 0x0, 0x2) r1 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs2/binder-control\x00', 0x800, 0x0) fallocate(r1, 0x40, 0x7, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x200f5ef, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r0) 02:45:31 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='oom_score_adj\x00') ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 3) [ 768.637995] kauditd_printk_skb: 2 callbacks suppressed [ 768.638014] audit: type=1326 audit(1712630731.833:747): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6511 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 768.660329] audit: type=1326 audit(1712630731.856:748): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6511 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 768.663451] audit: type=1326 audit(1712630731.856:749): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6511 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 768.667645] audit: type=1326 audit(1712630731.856:750): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6511 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:45:31 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 768.687150] audit: type=1326 audit(1712630731.870:751): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6511 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 768.698233] FAULT_INJECTION: forcing a failure. [ 768.698233] name failslab, interval 1, probability 0, space 0, times 0 [ 768.699867] CPU: 0 PID: 6513 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 768.700855] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 768.702029] Call Trace: [ 768.702435] dump_stack+0x107/0x167 [ 768.702976] should_fail.cold+0x5/0xa [ 768.703539] ? __alloc_skb+0x6d/0x5b0 [ 768.704087] should_failslab+0x5/0x20 [ 768.704662] kmem_cache_alloc_node+0x55/0x330 [ 768.705490] ? trace_hardirqs_on+0x5b/0x180 [ 768.706298] __alloc_skb+0x6d/0x5b0 [ 768.706987] audit_log_start.part.0+0x2a3/0x730 [ 768.707843] ? audit_log_task_context+0x170/0x170 [ 768.708721] ? audit_filter+0x5d6/0xb10 [ 768.709471] ? __bpf_prog_run64+0xe0/0xe0 [ 768.710095] ? audit_compare_dname_path+0x120/0x120 [ 768.710926] ? perf_trace_lock+0xac/0x490 [ 768.711550] audit_log_start+0x5f/0x90 [ 768.712101] audit_seccomp+0x5d/0x200 [ 768.712672] ? lock_downgrade+0x6d0/0x6d0 [ 768.713288] __seccomp_filter+0x669/0x1530 [ 768.713895] ? seccomp_notify_ioctl+0xda0/0xda0 [ 768.714575] ? __mutex_unlock_slowpath+0xe1/0x600 [ 768.715301] ? wait_for_completion_io+0x270/0x270 [ 768.715992] ? fput_many+0x2f/0x1a0 [ 768.716552] ? ksys_write+0x1a9/0x260 [ 768.717105] __secure_computing+0x191/0x2f0 [ 768.717799] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 768.718654] do_syscall_64+0xf/0x40 [ 768.719233] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 768.720018] RIP: 0033:0x7f5b4d031b19 [ 768.720605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 768.723478] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 768.724663] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 768.725774] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 768.726900] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 768.728011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 768.729131] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 [ 768.730420] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 768.731624] audit: out of memory in audit_log_start 02:45:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) clock_gettime(0x1, &(0x7f0000000100)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000002a00), 0x0, 0x2000, &(0x7f0000002ac0)={r2, r3+60000000}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r5, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r5, 0x40086602, &(0x7f0000000000)) signalfd(r5, &(0x7f0000000180), 0x8) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) close(r4) 02:45:31 executing program 5: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 768.764646] audit: type=1326 audit(1712630731.870:752): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6511 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4cfe4a04 code=0x7ffc0000 02:45:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 4) 02:45:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 768.794822] audit: type=1326 audit(1712630731.894:753): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6511 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 [ 768.827051] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 768.841658] audit: type=1326 audit(1712630731.929:754): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6511 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5b4cfe469c code=0x7ffc0000 [ 768.849419] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 02:45:32 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 768.864063] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 768.868279] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 02:45:32 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 768.906869] FAULT_INJECTION: forcing a failure. [ 768.906869] name failslab, interval 1, probability 0, space 0, times 0 [ 768.909076] CPU: 0 PID: 6532 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 768.910467] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 768.912299] Call Trace: [ 768.912895] dump_stack+0x107/0x167 [ 768.913719] should_fail.cold+0x5/0xa [ 768.914584] ? create_object.isra.0+0x3a/0xa20 [ 768.915639] should_failslab+0x5/0x20 [ 768.916495] kmem_cache_alloc+0x5b/0x310 [ 768.917227] ? kmem_cache_alloc+0x159/0x310 [ 768.917981] create_object.isra.0+0x3a/0xa20 [ 768.918767] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 768.919666] kmem_cache_alloc_node+0x169/0x330 [ 768.920495] __alloc_skb+0x6d/0x5b0 [ 768.921138] audit_log_start.part.0+0x2a3/0x730 [ 768.921969] ? audit_log_task_context+0x170/0x170 [ 768.922831] ? audit_filter+0x5d6/0xb10 [ 768.923543] ? __bpf_prog_run64+0xe0/0xe0 [ 768.924287] ? audit_compare_dname_path+0x120/0x120 [ 768.925146] ? perf_trace_lock+0xac/0x490 [ 768.925894] audit_log_start+0x5f/0x90 [ 768.926581] audit_seccomp+0x5d/0x200 [ 768.927250] ? lock_downgrade+0x6d0/0x6d0 [ 768.927964] __seccomp_filter+0x669/0x1530 [ 768.928719] ? seccomp_notify_ioctl+0xda0/0xda0 [ 768.929539] ? __mutex_unlock_slowpath+0xe1/0x600 [ 768.930371] ? wait_for_completion_io+0x270/0x270 [ 768.931233] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 768.932012] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 768.932959] ? ksys_write+0x1a9/0x260 [ 768.933646] __secure_computing+0x191/0x2f0 [ 768.934410] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 768.935352] do_syscall_64+0xf/0x40 [ 768.935977] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 768.936876] RIP: 0033:0x7f5b4d031b19 [ 768.937524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 768.940674] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 768.941991] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 768.943267] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 768.944482] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 768.945716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 768.946939] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 02:45:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x9, 0x40, 0x3f, 0x0, 0x8001, 0x12, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0x5, 0xfffffffffffffffc}, 0x4000, 0xccf, 0x1f, 0x1, 0x7, 0x2, 0xffe1, 0x0, 0x8, 0x0, 0x4}, r0, 0xe, 0xffffffffffffffff, 0x8) r1 = open(0x0, 0x0, 0x0) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:45:32 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:32 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:32 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181142, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) sendfile(r0, r0, &(0x7f0000000140)=0x80000001, 0x8000) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x503800, 0x0) r4 = fsmount(r2, 0x0, 0x19) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) lseek(r5, 0x0, 0x2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000000500)={{0x1, 0x1, 0x18, r2, {0x2, 0x6}}, './file0\x00'}) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000540)={0x0, 0x4, 0x27, 0x850d}) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r7, 0x0, r5, 0x0, 0x200f5ef, 0x0) execveat(r5, &(0x7f0000000180)='./file1\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='A\x00', &(0x7f0000000200)='[$\'+:%@#\x00', &(0x7f0000000240)='*)\x00', &(0x7f0000000280)='/dev/hpet\x00', &(0x7f00000002c0)='/dev/hpet\x00'], &(0x7f00000004c0)=[&(0x7f0000000340)=')\a(@%*&\x00', &(0x7f0000000380)='/dev/hpet\x00', &(0x7f00000003c0)='{^$\\+%.\x00', &(0x7f0000000400)='^\xf0&\xb6,\x81/[\\.:#\x00', &(0x7f0000000440)='!).]*}{!:,-\x00', &(0x7f0000000480)='-\\:\x00'], 0x800) r8 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x183000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r3, &(0x7f0000000100)={r4, r8, 0xffff}) 02:45:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) signalfd4(r0, &(0x7f0000000080)={[0xfffffffffffffffc]}, 0x8, 0x0) r2 = getpgid(0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0xffffff7a, &(0x7f0000000180)={&(0x7f0000000300)={0x28, 0x1e, 0xc0b12afe4b722e85, 0x0, 0x0, {0x20}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0xc, 0x0, 0x0, @pid=r2}, @nested={0x4, 0x7a}]}, 0x28}, 0x1, 0x0, 0x0, 0x24040080}, 0xc4101) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f0000000240)='./file0\x00', 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) io_uring_enter(r1, 0x728b, 0xaadf, 0x3, &(0x7f00000002c0)={[0xb6]}, 0x8) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1081030000000000) 02:45:32 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 5) [ 769.211278] FAULT_INJECTION: forcing a failure. [ 769.211278] name failslab, interval 1, probability 0, space 0, times 0 [ 769.213124] CPU: 0 PID: 6552 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 769.214156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 769.215419] Call Trace: [ 769.215821] dump_stack+0x107/0x167 [ 769.216378] should_fail.cold+0x5/0xa [ 769.217055] should_failslab+0x5/0x20 [ 769.217791] __kmalloc_node_track_caller+0x74/0x3b0 [ 769.218745] ? audit_log_start.part.0+0x2a3/0x730 [ 769.219691] __alloc_skb+0xb1/0x5b0 [ 769.220427] audit_log_start.part.0+0x2a3/0x730 [ 769.221358] ? audit_log_task_context+0x170/0x170 [ 769.222306] ? audit_filter+0x5d6/0xb10 [ 769.223027] ? __bpf_prog_run64+0xe0/0xe0 [ 769.223690] ? audit_compare_dname_path+0x120/0x120 [ 769.224464] ? perf_trace_lock+0xac/0x490 [ 769.225110] audit_log_start+0x5f/0x90 [ 769.225721] audit_seccomp+0x5d/0x200 [ 769.226315] ? lock_downgrade+0x6d0/0x6d0 [ 769.226963] __seccomp_filter+0x669/0x1530 [ 769.227638] ? seccomp_notify_ioctl+0xda0/0xda0 [ 769.228367] ? __mutex_unlock_slowpath+0xe1/0x600 [ 769.229105] ? wait_for_completion_io+0x270/0x270 [ 769.229867] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 769.230580] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 769.231407] ? ksys_write+0x1a9/0x260 [ 769.231995] __secure_computing+0x191/0x2f0 [ 769.232647] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 769.233471] do_syscall_64+0xf/0x40 [ 769.233998] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 769.234794] RIP: 0033:0x7f5b4d031b19 [ 769.235363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 769.238120] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 769.239532] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 769.240785] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 769.242033] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 769.243262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 769.244052] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 02:45:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 6) 02:45:47 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:45:47 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 784.370112] kauditd_printk_skb: 31 callbacks suppressed [ 784.370123] audit: type=1326 audit(1712630747.566:784): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 784.372726] audit: type=1326 audit(1712630747.566:785): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 784.397139] audit: type=1326 audit(1712630747.592:786): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 784.399060] audit: type=1326 audit(1712630747.592:787): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 784.406426] audit: type=1326 audit(1712630747.592:788): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 784.408411] audit: type=1326 audit(1712630747.597:789): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 784.416458] audit: type=1326 audit(1712630747.599:790): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 784.424909] FAULT_INJECTION: forcing a failure. [ 784.424909] name failslab, interval 1, probability 0, space 0, times 0 [ 784.425901] CPU: 0 PID: 6568 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 784.426490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 784.427193] Call Trace: [ 784.427419] dump_stack+0x107/0x167 [ 784.427721] should_fail.cold+0x5/0xa [ 784.428036] ? create_object.isra.0+0x3a/0xa20 [ 784.428422] should_failslab+0x5/0x20 [ 784.428743] kmem_cache_alloc+0x5b/0x310 [ 784.429082] create_object.isra.0+0x3a/0xa20 [ 784.429459] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 784.429881] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 784.430303] ? audit_log_start.part.0+0x2a3/0x730 [ 784.430707] __alloc_skb+0xb1/0x5b0 [ 784.431016] audit_log_start.part.0+0x2a3/0x730 [ 784.431415] ? audit_log_task_context+0x170/0x170 [ 784.431818] ? audit_filter+0x5d6/0xb10 [ 784.432309] ? __bpf_prog_run64+0xe0/0xe0 [ 784.432717] ? audit_compare_dname_path+0x120/0x120 [ 784.433138] ? perf_trace_lock+0xac/0x490 [ 784.433495] audit_log_start+0x5f/0x90 [ 784.433822] audit_seccomp+0x5d/0x200 [ 784.434128] ? lock_downgrade+0x6d0/0x6d0 [ 784.434484] __seccomp_filter+0x669/0x1530 [ 784.434839] ? seccomp_notify_ioctl+0xda0/0xda0 [ 784.435238] ? __mutex_unlock_slowpath+0xe1/0x600 [ 784.435641] ? wait_for_completion_io+0x270/0x270 [ 784.436044] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 784.436434] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 784.436873] ? ksys_write+0x1a9/0x260 [ 784.437201] __secure_computing+0x191/0x2f0 [ 784.437563] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 784.437997] do_syscall_64+0xf/0x40 [ 784.438319] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 784.438743] RIP: 0033:0x7f5b4d031b19 [ 784.439057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 784.440585] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 784.441224] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 784.441811] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 784.442404] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 784.443001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 784.443606] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 02:45:47 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:47 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x1) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) setxattr$security_selinux(&(0x7f0000000180)='./file1\x00', &(0x7f0000000200), &(0x7f0000000240)='system_u:object_r:src_t:s0\x00', 0x1b, 0x1) 02:45:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:47 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181142, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) sendfile(r0, r0, &(0x7f0000000140)=0x80000001, 0x8000) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x503800, 0x0) r4 = fsmount(r2, 0x0, 0x19) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) lseek(r5, 0x0, 0x2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000000500)={{0x1, 0x1, 0x18, r2, {0x2, 0x6}}, './file0\x00'}) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000540)={0x0, 0x4, 0x27, 0x850d}) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r7, 0x0, r5, 0x0, 0x200f5ef, 0x0) execveat(r5, &(0x7f0000000180)='./file1\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='A\x00', &(0x7f0000000200)='[$\'+:%@#\x00', &(0x7f0000000240)='*)\x00', &(0x7f0000000280)='/dev/hpet\x00', &(0x7f00000002c0)='/dev/hpet\x00'], &(0x7f00000004c0)=[&(0x7f0000000340)=')\a(@%*&\x00', &(0x7f0000000380)='/dev/hpet\x00', &(0x7f00000003c0)='{^$\\+%.\x00', &(0x7f0000000400)='^\xf0&\xb6,\x81/[\\.:#\x00', &(0x7f0000000440)='!).]*}{!:,-\x00', &(0x7f0000000480)='-\\:\x00'], 0x800) r8 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x183000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r3, &(0x7f0000000100)={r4, r8, 0xffff}) 02:45:47 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 784.462888] audit: type=1326 audit(1712630747.599:791): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 784.464835] audit: type=1326 audit(1712630747.599:792): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4cfe4a04 code=0x7ffc0000 [ 784.471582] audit: type=1326 audit(1712630747.599:793): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 [ 784.479340] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 784.496298] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 784.499571] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 784.503436] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 02:45:47 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:45:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, 0x0, 0xfdef) 02:45:47 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:45:47 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181142, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) sendfile(r0, r0, &(0x7f0000000140)=0x80000001, 0x8000) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x503800, 0x0) r4 = fsmount(r2, 0x0, 0x19) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) lseek(r5, 0x0, 0x2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000000500)={{0x1, 0x1, 0x18, r2, {0x2, 0x6}}, './file0\x00'}) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000540)={0x0, 0x4, 0x27, 0x850d}) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r7, 0x0, r5, 0x0, 0x200f5ef, 0x0) execveat(r5, &(0x7f0000000180)='./file1\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='A\x00', &(0x7f0000000200)='[$\'+:%@#\x00', &(0x7f0000000240)='*)\x00', &(0x7f0000000280)='/dev/hpet\x00', &(0x7f00000002c0)='/dev/hpet\x00'], &(0x7f00000004c0)=[&(0x7f0000000340)=')\a(@%*&\x00', &(0x7f0000000380)='/dev/hpet\x00', &(0x7f00000003c0)='{^$\\+%.\x00', &(0x7f0000000400)='^\xf0&\xb6,\x81/[\\.:#\x00', &(0x7f0000000440)='!).]*}{!:,-\x00', &(0x7f0000000480)='-\\:\x00'], 0x800) r8 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x183000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r3, &(0x7f0000000100)={r4, r8, 0xffff}) [ 784.678159] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 784.679594] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 02:46:03 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181142, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) sendfile(r0, r0, &(0x7f0000000140)=0x80000001, 0x8000) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x503800, 0x0) r4 = fsmount(r2, 0x0, 0x19) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, 0x0) lseek(r5, 0x0, 0x2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000000500)={{0x1, 0x1, 0x18, r2, {0x2, 0x6}}, './file0\x00'}) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000540)={0x0, 0x4, 0x27, 0x850d}) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r7, 0x0, r5, 0x0, 0x200f5ef, 0x0) execveat(r5, &(0x7f0000000180)='./file1\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='A\x00', &(0x7f0000000200)='[$\'+:%@#\x00', &(0x7f0000000240)='*)\x00', &(0x7f0000000280)='/dev/hpet\x00', &(0x7f00000002c0)='/dev/hpet\x00'], &(0x7f00000004c0)=[&(0x7f0000000340)=')\a(@%*&\x00', &(0x7f0000000380)='/dev/hpet\x00', &(0x7f00000003c0)='{^$\\+%.\x00', &(0x7f0000000400)='^\xf0&\xb6,\x81/[\\.:#\x00', &(0x7f0000000440)='!).]*}{!:,-\x00', &(0x7f0000000480)='-\\:\x00'], 0x800) r8 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x183000, 0x0) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r3, &(0x7f0000000100)={r4, r8, 0xffff}) 02:46:03 executing program 6: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:03 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:03 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x40}}, './file0\x00'}) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x80, 0xf7, 0x9, 0x0, 0x0, 0x57, 0x70000, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x4, @perf_config_ext={0x8, 0x81}, 0x18, 0xec, 0x80000000, 0x8, 0xffff, 0x4, 0x0, 0x0, 0x2, 0x0, 0x9f26}, 0xffffffffffffffff, 0xf, r1, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, 0x0) lseek(r2, 0x0, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) sendto(r2, &(0x7f0000000200)="29852573ca081017cc11c14a1317c699bcf83c5d8fa1141333101d4fcb29c1bc2bbe93c2f0d95c6092528533641d40d8c4ef2ee52430d800eb3c782df4efe9c8d76d408263ad89ead3f14769d78942ec18258b694f70cd5adc2be09ab43d566ab1431ffa84568d464f24550deae6bbd53175a68cba58ad1bf440718d76532894df8c71467a34a7dab26cb413beaefa012f0312ff6c8de9199e2d8daed0b9e4b7d60b9e18694a620f987ddfb72869ef7831f819f0a17e5b81", 0xb8, 0x0, 0x0, 0x0) 02:46:03 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 7) 02:46:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, 0x0, 0xfdef) 02:46:03 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 799.876771] kauditd_printk_skb: 6 callbacks suppressed [ 799.876789] audit: type=1326 audit(1712630763.072:800): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6618 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 799.887541] audit: type=1326 audit(1712630763.083:801): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6618 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 799.910704] audit: type=1326 audit(1712630763.102:802): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6618 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, 0x0, 0xfdef) 02:46:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) flistxattr(r1, &(0x7f0000000200)=""/236, 0xec) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) [ 799.931351] FAULT_INJECTION: forcing a failure. [ 799.931351] name failslab, interval 1, probability 0, space 0, times 0 [ 799.933466] CPU: 0 PID: 6623 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 799.934525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 799.935812] Call Trace: [ 799.936228] dump_stack+0x107/0x167 [ 799.936795] should_fail.cold+0x5/0xa [ 799.937393] should_failslab+0x5/0x20 [ 799.937987] __kmalloc_track_caller+0x79/0x370 [ 799.938696] ? sidtab_sid2str_get+0x17e/0x720 [ 799.939410] kmemdup+0x23/0x50 [ 799.939914] sidtab_sid2str_get+0x17e/0x720 [ 799.940584] ? audit_log_format+0xca/0x120 [ 799.941247] sidtab_entry_to_string+0x33/0x110 [ 799.941960] security_sid_to_context_core+0x33c/0x5d0 [ 799.942770] security_secid_to_secctx+0x72/0xc0 [ 799.943506] audit_log_task_context+0xf0/0x170 [ 799.944218] ? audit_log_format+0x120/0x120 [ 799.944884] ? from_kuid+0x85/0xc0 [ 799.945452] audit_log_task+0x1cd/0x310 [ 799.946066] ? __audit_log_nfcfg+0x210/0x210 [ 799.946762] audit_seccomp+0x76/0x200 [ 799.947363] ? lock_downgrade+0x6d0/0x6d0 [ 799.948008] __seccomp_filter+0x669/0x1530 [ 799.948670] ? seccomp_notify_ioctl+0xda0/0xda0 [ 799.949391] ? __mutex_unlock_slowpath+0xe1/0x600 [ 799.950141] ? wait_for_completion_io+0x270/0x270 [ 799.950894] ? fput_many+0x2f/0x1a0 [ 799.951468] ? ksys_write+0x1a9/0x260 [ 799.952064] __secure_computing+0x191/0x2f0 [ 799.952738] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 799.953562] do_syscall_64+0xf/0x40 [ 799.954123] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 799.954917] RIP: 0033:0x7f5b4d031b19 [ 799.955505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 799.956614] audit: type=1326 audit(1712630763.126:803): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6618 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 799.958314] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 799.958346] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 799.958357] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 799.958368] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 799.958385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 799.967058] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 [ 799.968288] audit: error in audit_log_task_context 02:46:03 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 799.984746] audit: type=1326 audit(1712630763.126:804): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6618 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x66e2, 0x0) ftruncate(r0, 0x1000003) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x7, 0xff, 0x7, 0x57, 0x0, 0x3f, 0x22004, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x66ae1ebe75550385, @perf_config_ext={0xfff, 0x4}, 0x8, 0x1, 0x5, 0x5, 0x7, 0x3, 0x4, 0x0, 0xb7, 0x0, 0xffff}, r0, 0x7, r0, 0x9) sendfile(r0, r1, &(0x7f0000000140)=0x5, 0x49) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x8}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) lseek(r2, 0x0, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) [ 800.017773] audit: type=1326 audit(1712630763.126:805): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6618 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4cfe4a04 code=0x7ffc0000 [ 800.111329] audit: type=1326 audit(1712630763.127:806): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6618 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 [ 800.146087] audit: type=1326 audit(1712630763.127:807): auid=0 uid=0 gid=0 ses=4 pid=6618 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:03 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 800.179460] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 800.182308] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 800.184550] audit: type=1326 audit(1712630763.232:808): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6618 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5b4cfe469c code=0x7ffc0000 [ 800.208035] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 800.213830] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 02:46:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 8) 02:46:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171"], 0xfdef) 02:46:03 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) lsetxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f0000000200)=@v1={0x1000000, [{0x401, 0x8}]}, 0xc, 0x2) [ 800.337877] FAULT_INJECTION: forcing a failure. [ 800.337877] name failslab, interval 1, probability 0, space 0, times 0 [ 800.339625] CPU: 0 PID: 6655 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 800.340677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 800.341950] Call Trace: [ 800.342366] dump_stack+0x107/0x167 [ 800.342941] should_fail.cold+0x5/0xa [ 800.343545] ? create_object.isra.0+0x3a/0xa20 [ 800.344257] should_failslab+0x5/0x20 [ 800.344848] kmem_cache_alloc+0x5b/0x310 [ 800.345481] ? sidtab_sid2str_get+0x65/0x720 [ 800.346169] create_object.isra.0+0x3a/0xa20 [ 800.346850] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 800.347647] __kmalloc_track_caller+0x177/0x370 [ 800.348369] ? sidtab_sid2str_get+0x17e/0x720 [ 800.349076] kmemdup+0x23/0x50 [ 800.349580] sidtab_sid2str_get+0x17e/0x720 [ 800.350248] ? audit_log_format+0xca/0x120 [ 800.350908] sidtab_entry_to_string+0x33/0x110 [ 800.351628] security_sid_to_context_core+0x33c/0x5d0 [ 800.352436] security_secid_to_secctx+0x72/0xc0 [ 800.353165] audit_log_task_context+0xf0/0x170 [ 800.353871] ? audit_log_format+0x120/0x120 [ 800.354536] ? from_kuid+0x85/0xc0 [ 800.355108] audit_log_task+0x1cd/0x310 [ 800.355722] ? __audit_log_nfcfg+0x210/0x210 [ 800.356416] audit_seccomp+0x76/0x200 [ 800.357004] ? lock_downgrade+0x6d0/0x6d0 [ 800.357649] __seccomp_filter+0x669/0x1530 [ 800.358309] ? seccomp_notify_ioctl+0xda0/0xda0 [ 800.359041] ? __mutex_unlock_slowpath+0xe1/0x600 [ 800.359793] ? wait_for_completion_io+0x270/0x270 [ 800.360545] ? fput_many+0x2f/0x1a0 [ 800.361111] ? ksys_write+0x1a9/0x260 [ 800.361705] __secure_computing+0x191/0x2f0 [ 800.362376] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 800.363210] do_syscall_64+0xf/0x40 [ 800.363774] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 800.364561] RIP: 0033:0x7f5b4d031b19 [ 800.365138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 800.367950] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 800.369124] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 800.370218] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 800.371321] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 800.372422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 800.373517] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 02:46:16 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 813.819279] kauditd_printk_skb: 17 callbacks suppressed [ 813.819291] audit: type=1326 audit(1712630777.015:826): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 813.828057] audit: type=1326 audit(1712630777.023:827): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 813.830119] audit: type=1326 audit(1712630777.023:828): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 9) 02:46:16 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x3, 0x1, 0x40}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) ioctl(r4, 0x3, &(0x7f0000000380)="7a95b0c9127e41d831ce79b51f49706280248bf6235f6a6554ac20eb4e84cf52dba9a59d999bfb07724c164b755fa19a12ffa1e7109ec391f8aa745262529f50406ae2a867a6c020d0d8bbf5496d662188bc236f1a56ac6731e71981b14582be9cf14f592d000735e3d3b96985724c378af958b0219d24ff993625949563657bb59f47c825b9435313c0fde2bebd68a21975a1d600d85c4bf94782e13cc126f6ad597f44dae591f7654e987149b19fa35b224e0f2b9157d6a1c7eaf15caf9d2caafdae") copy_file_range(r4, 0x0, r5, 0x0, 0xa1, 0x0) openat(r4, &(0x7f0000000180)='./file0/file0\x00', 0x48940, 0xc4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f00000002c0)={0x2, 0x80, 0xd8, 0x6, 0x2, 0x2, 0x0, 0xffffffff00000000, 0x13840, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x81, 0x1, @perf_bp={&(0x7f0000000140)}, 0x105, 0x8, 0x1, 0x1, 0x7bd, 0x1, 0x101, 0x0, 0x4, 0x0, 0x2}) ioctl$FIONREAD(r3, 0x6801, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x2c) unshare(0x48020200) 02:46:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e"], 0xfdef) 02:46:16 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='user.incfs.size\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:46:16 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:46:16 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 813.838389] FAULT_INJECTION: forcing a failure. [ 813.838389] name failslab, interval 1, probability 0, space 0, times 0 [ 813.840246] CPU: 1 PID: 6671 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 813.840889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 813.841661] Call Trace: [ 813.841918] dump_stack+0x107/0x167 [ 813.842262] should_fail.cold+0x5/0xa [ 813.842626] ? audit_log_d_path+0xce/0x190 [ 813.843027] should_failslab+0x5/0x20 [ 813.843396] kmem_cache_alloc_trace+0x55/0x320 [ 813.843830] audit_log_d_path+0xce/0x190 [ 813.844214] audit_log_d_path_exe+0x40/0x70 [ 813.844619] audit_log_task+0x278/0x310 [ 813.844993] ? __audit_log_nfcfg+0x210/0x210 [ 813.845416] audit_seccomp+0x76/0x200 [ 813.845778] ? lock_downgrade+0x6d0/0x6d0 [ 813.846170] __seccomp_filter+0x669/0x1530 [ 813.846573] ? seccomp_notify_ioctl+0xda0/0xda0 [ 813.847016] ? __mutex_unlock_slowpath+0xe1/0x600 [ 813.847484] ? wait_for_completion_io+0x270/0x270 [ 813.847946] ? fput_many+0x2f/0x1a0 [ 813.848293] ? ksys_write+0x1a9/0x260 [ 813.848657] __secure_computing+0x191/0x2f0 [ 813.849068] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 813.849575] do_syscall_64+0xf/0x40 [ 813.849919] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 813.850397] RIP: 0033:0x7f5b4d031b19 [ 813.850754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 813.852476] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 813.853189] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 813.853854] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 813.854521] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 813.855193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 813.855863] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 [ 813.859832] audit: type=1326 audit(1712630777.023:829): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 813.861905] audit: type=1326 audit(1712630777.024:830): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:17 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 813.901669] audit: type=1326 audit(1712630777.034:831): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4cfe4a04 code=0x7ffc0000 02:46:17 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT], 0xfdef) [ 813.919135] audit: type=1326 audit(1712630777.034:832): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 [ 813.942769] audit: type=1326 audit(1712630777.034:833): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 813.967818] audit: type=1326 audit(1712630777.074:834): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5b4cfe469c code=0x7ffc0000 [ 814.028430] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 814.030463] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 814.035022] audit: type=1326 audit(1712630777.074:835): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6670 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 02:46:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397"], 0xfdef) 02:46:30 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x54}, 0x408c4, 0x0, 0x0, 0x0, 0x0, 0xaf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xf7, &(0x7f0000000000)) io_setup(0x735, &(0x7f0000000040)=0x0) io_destroy(r0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_io_uring_setup(0x52bc, &(0x7f0000000080)={0x0, 0x4dc9, 0x15, 0x3, 0x80, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000140), 0x1) r4 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000002c0)=0x4000) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000580)='net/ptype\x00') ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x1f0c) 02:46:30 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:30 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:46:30 executing program 1: arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000002c0)={r0, 0x2, 0x4, 0xaf43}) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, @perf_config_ext={0x100000001, 0x100}, 0x0, 0x8}, 0x0, 0x0, r1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000240), 0x1, 0x80000) fchownat(r2, &(0x7f0000000280)='./file0\x00', 0xee00, 0x0, 0x400) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x4) setxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f0000000200)={'U+', 0x20}, 0x16, 0x1) 02:46:30 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 10) 02:46:30 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:30 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 827.713983] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 827.721098] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 827.724585] kauditd_printk_skb: 3 callbacks suppressed [ 827.724608] audit: type=1326 audit(1712630790.920:839): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6710 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 827.733031] audit: type=1326 audit(1712630790.929:840): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6710 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 827.782838] audit: type=1326 audit(1712630790.977:841): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6710 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:30 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 827.787022] FAULT_INJECTION: forcing a failure. [ 827.787022] name failslab, interval 1, probability 0, space 0, times 0 [ 827.787648] audit: type=1326 audit(1712630790.978:842): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6710 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 827.788936] CPU: 1 PID: 6714 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 827.790800] audit: type=1326 audit(1712630790.978:843): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6710 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 827.791702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 827.791708] Call Trace: [ 827.791733] dump_stack+0x107/0x167 [ 827.791754] should_fail.cold+0x5/0xa [ 827.794065] audit: type=1326 audit(1712630790.978:844): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6710 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4cfe4a04 code=0x7ffc0000 [ 827.794873] ? create_object.isra.0+0x3a/0xa20 [ 827.794896] should_failslab+0x5/0x20 [ 827.794915] kmem_cache_alloc+0x5b/0x310 [ 827.794938] ? audit_log_format+0xca/0x120 [ 827.795637] audit: type=1326 audit(1712630790.983:845): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6710 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 [ 827.795727] create_object.isra.0+0x3a/0xa20 [ 827.805732] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 827.806535] kmem_cache_alloc_trace+0x151/0x320 [ 827.807273] audit_log_d_path+0xce/0x190 [ 827.807925] audit_log_d_path_exe+0x40/0x70 [ 827.808601] audit_log_task+0x278/0x310 [ 827.809232] ? __audit_log_nfcfg+0x210/0x210 [ 827.809936] audit_seccomp+0x76/0x200 [ 827.810536] ? lock_downgrade+0x6d0/0x6d0 [ 827.811185] __seccomp_filter+0x669/0x1530 [ 827.811860] ? seccomp_notify_ioctl+0xda0/0xda0 [ 827.812589] ? __mutex_unlock_slowpath+0xe1/0x600 [ 827.813349] ? wait_for_completion_io+0x270/0x270 [ 827.814104] ? fput_many+0x2f/0x1a0 [ 827.814678] ? ksys_write+0x1a9/0x260 [ 827.815276] __secure_computing+0x191/0x2f0 [ 827.815963] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 827.816800] do_syscall_64+0xf/0x40 [ 827.817369] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 827.818165] RIP: 0033:0x7f5b4d031b19 [ 827.818746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 827.821569] RSP: 002b:00007f5b4a5a7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 827.822743] RAX: ffffffffffffffda RBX: 00007f5b4d144f60 RCX: 00007f5b4d031b19 [ 827.823853] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000004 [ 827.824959] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 827.826064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 827.827168] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 [ 827.845809] audit: type=1326 audit(1712630790.983:846): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6710 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:31 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:31 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') write$bt_hci(r0, &(0x7f0000000000)={0x1, @le_set_adv_param={{0x2006, 0xf}, {0x7ff, 0x400, 0x40, 0x6, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x6, 0x7}}}, 0x13) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x490, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc0d}, 0x108d8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_readv(r2, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7a}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xffffffbc}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) 02:46:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x30) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0xfc, 0x0, 0x0, 0x0, 0x400000, 0x80201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fff}}, './file0/file0\x00'}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x4) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) 02:46:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1"], 0xfdef) [ 827.965875] audit: type=1400 audit(1712630791.161:847): avc: denied { tracepoint } for pid=6729 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 02:46:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:31 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:31 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:46:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r0, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x9, 0x2, &(0x7f0000000300)=[{&(0x7f00000002c0)="13cbee85fd1d0706eec81d", 0xb, 0x400}, {&(0x7f0000000380)="f295b58dd13a59508d4c5beed3527f9027d301704b89aa34295bd9d636fe99a292291ad3f9cc000ef2697f0ac2499b2c756a69d33cf6dc9916240d4f0eeedf8c062fd15ffdc59253362fadd99ea5e7ff7fe3ceb4fbe0bdd3743b6fdf24f6ee2057e30d258ed1c440f36cdbaba128532b193277f1a989912d10648f4e237f34d6df53400a9a7026d61ac2add2c8d4a818821a1113981f022da7d3f0ace1cb754fd3", 0xa1, 0x3}], 0x100000, &(0x7f0000000500)=ANY=[@ANYBLOB="490edd10", @ANYRESHEX=0xee01, @ANYBLOB=',nodots,discard,check=normal,tz=UTC,dots,nocase,euid>', @ANYRESDEC=r0, @ANYBLOB="2c7375626a5f726f6c653d2c245e2c6d61736b3d5e4d41595f455845432c6f626a5f757365723d6367726f757032002c736d61636b66737472616e736d7574653d5c2c2c61707072616973652c736d61636b6673666c6f6f723d26c52f292c00"]) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() clock_gettime(0x0, &(0x7f0000001a00)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003440)=[{{&(0x7f00000005c0)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000640)=""/164, 0xa4}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000001700)=""/215, 0xd7}], 0x4, &(0x7f0000001800)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{0x0, 0x0, &(0x7f0000003300)=[{&(0x7f0000001840)=""/123, 0x7b}, {&(0x7f0000001900)=""/224, 0xe0}, {&(0x7f0000001f40)=""/183, 0xb7}, {&(0x7f0000002000)=""/136, 0x88}, {&(0x7f0000001b40)=""/113, 0x71}, {&(0x7f00000020c0)=""/66, 0x42}, {&(0x7f0000002140)=""/200, 0xc8}], 0x7, &(0x7f0000003380)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x2, 0x20, &(0x7f0000001e00)={r2, r3+10000000}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x7) process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {0x0}], 0x2, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x1080, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x2, 0x1f, 0x40, 0x0, 0x80, 0x10, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81e, 0x0, @perf_bp={&(0x7f0000000440), 0x1}, 0x900, 0x8c, 0x56, 0x4, 0x100, 0x2, 0x27, 0x0, 0x78, 0x0, 0x1}, r1, 0xf, r5, 0x2) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) [ 828.047098] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 828.048459] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 828.070884] audit: type=1326 audit(1712630791.267:848): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6710 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5b4cfe469c code=0x7ffc0000 02:46:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0], 0xfdef) 02:46:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:31 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:46:31 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 11) 02:46:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)={0xa6, 0x29, 0x1, {0xe76, [{{0x40, 0x3, 0x5}, 0x6, 0x0, 0x7, './file0'}, {{0x1, 0x0, 0x4}, 0xfffffffffffffff9, 0x1, 0x7, './file0'}, {{0x10, 0x3, 0x2}, 0x7ff, 0x44, 0x7, './file0'}, {{0x1, 0x2, 0x2}, 0x1, 0xe2, 0x7, './file0'}, {{0x8, 0x4}, 0x400, 0x0, 0x7, './file0'}]}}, 0xa6) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) [ 828.231823] FAULT_INJECTION: forcing a failure. [ 828.231823] name failslab, interval 1, probability 0, space 0, times 0 [ 828.233578] CPU: 1 PID: 6756 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 828.234606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 828.235853] Call Trace: [ 828.236257] dump_stack+0x107/0x167 [ 828.236811] should_fail.cold+0x5/0xa [ 828.237392] ? audit_log_start.part.0+0x27e/0x730 [ 828.238118] should_failslab+0x5/0x20 [ 828.238694] kmem_cache_alloc+0x5b/0x310 [ 828.239315] audit_log_start.part.0+0x27e/0x730 [ 828.240031] ? audit_log_task_context+0x170/0x170 [ 828.240754] ? audit_filter+0x5d6/0xb10 [ 828.241358] ? __bpf_prog_run64+0xe0/0xe0 [ 828.241983] ? audit_compare_dname_path+0x120/0x120 [ 828.242736] ? security_file_permission+0x24e/0x570 [ 828.243502] audit_log_start+0x5f/0x90 [ 828.244091] audit_seccomp+0x5d/0x200 [ 828.244672] __seccomp_filter+0x669/0x1530 [ 828.245318] ? seccomp_notify_ioctl+0xda0/0xda0 [ 828.246049] ? vfs_copy_file_range+0x1290/0x1290 [ 828.246758] ? ksys_write+0x1a9/0x260 [ 828.247344] __secure_computing+0x191/0x2f0 [ 828.248002] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 828.248806] do_syscall_64+0xf/0x40 [ 828.249352] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 828.250115] RIP: 0033:0x7f5b4cfe469c [ 828.250679] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 828.253387] RSP: 002b:00007f5b4a5a7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 828.254515] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b4cfe469c [ 828.255574] RDX: 000000000000000f RSI: 00007f5b4a5a71e0 RDI: 0000000000000005 [ 828.256630] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 828.257681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 828.258734] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 02:46:44 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') write$bt_hci(r0, &(0x7f0000000000)={0x1, @le_set_adv_param={{0x2006, 0xf}, {0x7ff, 0x400, 0x40, 0x6, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x6, 0x7}}}, 0x13) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x490, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc0d}, 0x108d8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_readv(r2, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7a}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xffffffbc}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) 02:46:44 executing program 7: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 12) [ 841.241150] kauditd_printk_skb: 17 callbacks suppressed [ 841.241163] audit: type=1326 audit(1712630804.434:864): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 841.243757] audit: type=1326 audit(1712630804.434:865): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:44 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:46:44 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[], 0xfdef) 02:46:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:44 executing program 1: sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x68, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x6}]}]}, 0x68}, 0x1, 0x0, 0x0, 0xc4}, 0x24000004) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x33b4, &(0x7f0000000200)={0x0, 0xd3c5, 0x0, 0x0, 0x113}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000180)) open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) [ 841.275636] audit: type=1326 audit(1712630804.445:866): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 841.277596] audit: type=1326 audit(1712630804.471:867): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 841.281759] audit: type=1326 audit(1712630804.472:868): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 841.292839] audit: type=1326 audit(1712630804.489:869): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 841.294892] audit: type=1326 audit(1712630804.489:870): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 841.297977] audit: type=1326 audit(1712630804.489:871): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 841.303971] audit: type=1326 audit(1712630804.500:872): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4cfe4a04 code=0x7ffc0000 [ 841.308360] FAULT_INJECTION: forcing a failure. [ 841.308360] name failslab, interval 1, probability 0, space 0, times 0 [ 841.308659] audit: type=1326 audit(1712630804.504:873): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6768 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 [ 841.310122] CPU: 0 PID: 6769 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 841.312861] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.314051] Call Trace: [ 841.314453] dump_stack+0x107/0x167 [ 841.314985] should_fail.cold+0x5/0xa [ 841.315556] ? create_object.isra.0+0x3a/0xa20 [ 841.316224] should_failslab+0x5/0x20 [ 841.316778] kmem_cache_alloc+0x5b/0x310 [ 841.317371] ? auditd_test_task+0x11e/0x300 [ 841.318001] create_object.isra.0+0x3a/0xa20 [ 841.318655] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 841.319403] kmem_cache_alloc+0x159/0x310 [ 841.320030] audit_log_start.part.0+0x27e/0x730 [ 841.320719] ? audit_log_task_context+0x170/0x170 [ 841.321415] ? audit_filter+0x5d6/0xb10 [ 841.322000] ? __bpf_prog_run64+0xe0/0xe0 [ 841.322603] ? audit_compare_dname_path+0x120/0x120 [ 841.323326] ? security_file_permission+0x24e/0x570 [ 841.324067] audit_log_start+0x5f/0x90 [ 841.324642] audit_seccomp+0x5d/0x200 [ 841.325212] __seccomp_filter+0x669/0x1530 [ 841.325832] ? seccomp_notify_ioctl+0xda0/0xda0 [ 841.326540] ? vfs_copy_file_range+0x1290/0x1290 [ 841.327232] ? ksys_write+0x1a9/0x260 [ 841.327805] __secure_computing+0x191/0x2f0 [ 841.328436] syscall_trace_enter.constprop.0+0x84/0x1e0 02:46:44 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000010c0)='/proc/diskstats\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2000) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f0000ff0000/0xd000)=nil, 0x0) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xe) shmdt(0x0) shmctl$IPC_RMID(r1, 0x0) shmctl$SHM_INFO(r1, 0xe, &(0x7f00000013c0)=""/133) shmctl$SHM_STAT(r1, 0xd, &(0x7f00000012c0)=""/194) r2 = shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ff9000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) r3 = shmget(0x2, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) shmat(r3, &(0x7f0000fef000/0x4000)=nil, 0x3000) shmctl$SHM_INFO(r1, 0xe, &(0x7f0000001100)=""/118) syz_io_uring_setup(0x77c3, &(0x7f0000001180)={0x0, 0xc496, 0x2, 0x3, 0x3bd, 0x0, r0}, &(0x7f0000ff0000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000001080)) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000001200)={0x0, 0xafa8, 0x0, 0x0, 0x193}, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, &(0x7f0000001280)) [ 841.329217] do_syscall_64+0xf/0x40 [ 841.329902] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 841.330658] RIP: 0033:0x7f5b4cfe469c [ 841.331197] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 841.333816] RSP: 002b:00007f5b4a5a7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 841.334899] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b4cfe469c [ 841.335931] RDX: 000000000000000f RSI: 00007f5b4a5a71e0 RDI: 0000000000000005 [ 841.336942] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.337955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 841.338976] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 02:46:44 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:44 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 13) [ 841.447094] FAULT_INJECTION: forcing a failure. [ 841.447094] name failslab, interval 1, probability 0, space 0, times 0 [ 841.448156] CPU: 1 PID: 6796 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 841.448736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.449444] Call Trace: [ 841.449680] dump_stack+0x107/0x167 [ 841.449992] should_fail.cold+0x5/0xa [ 841.450321] ? __alloc_skb+0x6d/0x5b0 [ 841.450650] should_failslab+0x5/0x20 [ 841.450977] kmem_cache_alloc_node+0x55/0x330 [ 841.451358] ? trace_hardirqs_on+0x5b/0x180 [ 841.451738] __alloc_skb+0x6d/0x5b0 [ 841.452055] audit_log_start.part.0+0x2a3/0x730 [ 841.452455] ? audit_log_task_context+0x170/0x170 [ 841.452862] ? audit_filter+0x5d6/0xb10 [ 841.453208] ? __bpf_prog_run64+0xe0/0xe0 [ 841.453560] ? audit_compare_dname_path+0x120/0x120 [ 841.453982] ? security_file_permission+0x24e/0x570 [ 841.454411] audit_log_start+0x5f/0x90 [ 841.454740] audit_seccomp+0x5d/0x200 [ 841.455069] __seccomp_filter+0x669/0x1530 [ 841.455433] ? seccomp_notify_ioctl+0xda0/0xda0 [ 841.455850] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 841.456233] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 841.456693] ? ksys_write+0x1a9/0x260 [ 841.457020] __secure_computing+0x191/0x2f0 [ 841.457394] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 841.457844] do_syscall_64+0xf/0x40 [ 841.458152] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 841.458588] RIP: 0033:0x7f5b4cfe469c [ 841.458907] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 841.460435] RSP: 002b:00007f5b4a5a7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 841.461084] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b4cfe469c [ 841.461678] RDX: 000000000000000f RSI: 00007f5b4a5a71e0 RDI: 0000000000000005 [ 841.462275] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.462867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 841.463466] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 [ 841.474121] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 02:46:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[], 0xfdef) (fail_nth: 1) [ 841.492651] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 841.512128] FAULT_INJECTION: forcing a failure. [ 841.512128] name failslab, interval 1, probability 0, space 0, times 0 [ 841.513386] CPU: 1 PID: 6801 Comm: syz-executor.0 Not tainted 5.10.214 #1 [ 841.513945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 841.514613] Call Trace: [ 841.514838] dump_stack+0x107/0x167 [ 841.515148] should_fail.cold+0x5/0xa [ 841.515467] ? file_tty_write.constprop.0+0x707/0x910 [ 841.515912] should_failslab+0x5/0x20 [ 841.516227] __kmalloc+0x72/0x390 [ 841.516512] ? mutex_trylock+0x237/0x2b0 [ 841.516851] ? file_tty_write.constprop.0+0x29f/0x910 [ 841.517278] file_tty_write.constprop.0+0x707/0x910 [ 841.517698] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 841.518109] new_sync_write+0x42c/0x660 [ 841.518443] ? new_sync_read+0x6f0/0x6f0 [ 841.518784] ? _cond_resched+0x12/0x80 [ 841.519102] ? avc_policy_seqno+0x9/0x70 [ 841.519441] ? selinux_file_permission+0x92/0x520 [ 841.519845] ? __fget_files+0x296/0x4c0 [ 841.520172] vfs_write+0x747/0xa70 [ 841.520464] ksys_write+0x12d/0x260 [ 841.520761] ? __ia32_sys_read+0xb0/0xb0 [ 841.521096] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 841.521518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 841.521937] do_syscall_64+0x33/0x40 [ 841.522238] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 841.522660] RIP: 0033:0x7fcf7d41ab19 [ 841.522964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 841.524469] RSP: 002b:00007fcf7a990188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 841.525083] RAX: ffffffffffffffda RBX: 00007fcf7d52df60 RCX: 00007fcf7d41ab19 [ 841.525656] RDX: 000000000000fdef RSI: 0000000020000c80 RDI: 0000000000000004 [ 841.526227] RBP: 00007fcf7a9901d0 R08: 0000000000000000 R09: 0000000000000000 [ 841.526801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.527374] R13: 00007ffdf360c15f R14: 00007fcf7a990300 R15: 0000000000022000 02:46:44 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:58 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:58 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x8, 0x0) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="740c67c496e94d3288166664", @ANYRESHEX, @ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',dfltgid=', @ANYRESHEX, @ANYBLOB=',posixacl,loose,versi', @ANYRESHEX=0x0, @ANYBLOB=',version=9p200', @ANYRESDEC, @ANYBLOB]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) lseek(r0, 0x0, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r1, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f00000006c0)={0xf4, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40040}, 0x14) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x402}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@empty}}}, &(0x7f00000000c0)=0xe8) io_setup(0x3, &(0x7f0000000000)=0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r3, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x2f, 0x2, 0x6a, 0x101, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x0, 0x61, 0x6}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0xc, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 855.012671] FAULT_INJECTION: forcing a failure. [ 855.012671] name failslab, interval 1, probability 0, space 0, times 0 [ 855.013756] CPU: 1 PID: 6813 Comm: syz-executor.0 Not tainted 5.10.214 #1 [ 855.014378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 855.015124] Call Trace: [ 855.015392] dump_stack+0x107/0x167 [ 855.015760] should_fail.cold+0x5/0xa [ 855.016110] ? create_object.isra.0+0x3a/0xa20 [ 855.016528] should_failslab+0x5/0x20 [ 855.016873] kmem_cache_alloc+0x5b/0x310 [ 855.017249] create_object.isra.0+0x3a/0xa20 [ 855.017650] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 855.018119] __kmalloc+0x16e/0x390 [ 855.018443] ? mutex_trylock+0x237/0x2b0 [ 855.018822] file_tty_write.constprop.0+0x707/0x910 [ 855.019273] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 855.019756] new_sync_write+0x42c/0x660 [ 855.020120] ? new_sync_read+0x6f0/0x6f0 [ 855.020490] ? _cond_resched+0x12/0x80 [ 855.020847] ? avc_policy_seqno+0x9/0x70 [ 855.021217] ? selinux_file_permission+0x92/0x520 [ 855.021661] ? __fget_files+0x296/0x4c0 [ 855.022036] vfs_write+0x747/0xa70 [ 855.022366] ksys_write+0x12d/0x260 [ 855.022701] ? __ia32_sys_read+0xb0/0xb0 [ 855.023077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 855.023554] ? syscall_enter_from_user_mode+0x1d/0x50 [ 855.024033] do_syscall_64+0x33/0x40 [ 855.024370] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 855.024826] RIP: 0033:0x7fcf7d41ab19 [ 855.025165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 855.026800] RSP: 002b:00007fcf7a990188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 855.027492] RAX: ffffffffffffffda RBX: 00007fcf7d52df60 RCX: 00007fcf7d41ab19 [ 855.028141] RDX: 000000000000fdef RSI: 0000000020000c80 RDI: 0000000000000004 [ 855.028783] RBP: 00007fcf7a9901d0 R08: 0000000000000000 R09: 0000000000000000 [ 855.029422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 855.030061] R13: 00007ffdf360c15f R14: 00007fcf7a990300 R15: 0000000000022000 02:46:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[], 0xfdef) (fail_nth: 2) 02:46:58 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:58 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:58 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:46:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000280)={@remote}, 0x14) r2 = syz_io_uring_setup(0x457e, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x3, 0xf5, 0x0, r0}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000180)=0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x59f5ee0a7c70a1ba, 0x0, @fd=r2, 0x3, 0x0, 0x1, 0x0, 0x1, {0x0, r6}}, 0xbd53) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, r2, 0x8000000) syz_io_uring_submit(r7, r4, &(0x7f00000001c0)=@IORING_OP_READ_FIXED={0x4, 0x0, 0x400e, @fd=r1, 0x2, 0x1ee, 0x5, 0x4, 0x0, {0x0, r5}}, 0x7) r8 = syz_io_uring_setup(0x457e, &(0x7f00000000c0)={0x0, 0x800058cd, 0x2, 0x1, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000180)=0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x59f5ee0a7c70a1ba, 0x0, @fd=r8, 0x3, 0x0, 0x1, 0x0, 0x1, {0x0, r11}}, 0xbd53) syz_io_uring_submit(r7, 0x0, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x4, 0x0, @fd_index=0x1, 0xbcf, 0x0, 0xe7, 0x1, 0x0, {0x0, r11}}, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, r0, 0x0) r12 = open(0x0, 0x0, 0x141) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r12, 0x10e, 0x2, &(0x7f0000000200)=0x13, 0x4) creat(&(0x7f0000000240)='./file0\x00', 0x4) 02:46:58 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 14) 02:46:58 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:46:58 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 855.135362] kauditd_printk_skb: 20 callbacks suppressed [ 855.135375] audit: type=1326 audit(1712630818.331:892): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 855.138114] audit: type=1326 audit(1712630818.331:893): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:58 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 855.165791] audit: type=1326 audit(1712630818.362:894): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4cfe4a04 code=0x7ffc0000 [ 855.168615] audit: type=1326 audit(1712630818.364:895): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 [ 855.170684] FAULT_INJECTION: forcing a failure. [ 855.170684] name failslab, interval 1, probability 0, space 0, times 0 [ 855.171765] CPU: 1 PID: 6822 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 855.172359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 855.173075] Call Trace: [ 855.173311] dump_stack+0x107/0x167 [ 855.173631] should_fail.cold+0x5/0xa [ 855.173961] ? create_object.isra.0+0x3a/0xa20 [ 855.174358] should_failslab+0x5/0x20 [ 855.174688] kmem_cache_alloc+0x5b/0x310 [ 855.175037] ? kmem_cache_alloc+0x159/0x310 [ 855.175411] create_object.isra.0+0x3a/0xa20 [ 855.175814] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 855.176254] kmem_cache_alloc_node+0x169/0x330 [ 855.176664] __alloc_skb+0x6d/0x5b0 [ 855.176989] audit_log_start.part.0+0x2a3/0x730 [ 855.177392] ? audit_log_task_context+0x170/0x170 [ 855.177805] ? audit_filter+0x5d6/0xb10 [ 855.178158] ? __bpf_prog_run64+0xe0/0xe0 [ 855.178516] ? audit_compare_dname_path+0x120/0x120 [ 855.178947] ? lock_acquire+0x197/0x470 [ 855.179289] ? find_held_lock+0x2c/0x110 [ 855.179657] audit_log_start+0x5f/0x90 [ 855.179996] audit_seccomp+0x5d/0x200 [ 855.180328] __seccomp_filter+0x669/0x1530 [ 855.180698] ? seccomp_notify_ioctl+0xda0/0xda0 [ 855.181115] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 855.181509] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 855.181991] ? ksys_write+0x1a9/0x260 [ 855.182324] __secure_computing+0x191/0x2f0 [ 855.182707] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 855.183171] do_syscall_64+0xf/0x40 [ 855.183491] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 855.183939] RIP: 0033:0x7f5b4cfe469c [ 855.184261] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 855.185830] RSP: 002b:00007f5b4a5a7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 855.186490] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f5b4cfe469c [ 855.187111] RDX: 000000000000000f RSI: 00007f5b4a5a71e0 RDI: 0000000000000004 [ 855.187734] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 855.188350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 855.188974] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 [ 855.192681] audit: type=1326 audit(1712630818.367:896): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=326 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 02:46:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[], 0xfdef) (fail_nth: 3) [ 855.225084] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 02:46:58 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) [ 855.235944] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 855.266842] FAULT_INJECTION: forcing a failure. [ 855.266842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 855.267895] CPU: 1 PID: 6847 Comm: syz-executor.0 Not tainted 5.10.214 #1 [ 855.268455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 855.269133] Call Trace: [ 855.269353] dump_stack+0x107/0x167 [ 855.269658] should_fail.cold+0x5/0xa [ 855.269981] _copy_from_iter+0x202/0xe80 [ 855.270325] ? __virt_addr_valid+0x170/0x5c0 [ 855.270686] ? __check_object_size+0x319/0x440 [ 855.271063] file_tty_write.constprop.0+0x4d5/0x910 [ 855.271465] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 855.271896] new_sync_write+0x42c/0x660 [ 855.272224] ? new_sync_read+0x6f0/0x6f0 [ 855.272568] ? _cond_resched+0x12/0x80 [ 855.272892] ? avc_policy_seqno+0x9/0x70 [ 855.273221] ? selinux_file_permission+0x92/0x520 [ 855.273618] ? __fget_files+0x296/0x4c0 [ 855.273953] vfs_write+0x747/0xa70 [ 855.274251] ksys_write+0x12d/0x260 [ 855.274552] ? __ia32_sys_read+0xb0/0xb0 [ 855.274891] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 855.275320] ? syscall_enter_from_user_mode+0x1d/0x50 [ 855.275751] do_syscall_64+0x33/0x40 [ 855.276054] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 855.276468] RIP: 0033:0x7fcf7d41ab19 [ 855.276776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 855.278263] RSP: 002b:00007fcf7a990188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 855.278879] RAX: ffffffffffffffda RBX: 00007fcf7d52df60 RCX: 00007fcf7d41ab19 [ 855.279455] RDX: 000000000000fdef RSI: 0000000020000c80 RDI: 0000000000000004 [ 855.280037] RBP: 00007fcf7a9901d0 R08: 0000000000000000 R09: 0000000000000000 [ 855.280617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 855.281192] R13: 00007ffdf360c15f R14: 00007fcf7a990300 R15: 0000000000022000 02:46:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) signalfd(r0, &(0x7f0000000180), 0x8) getpeername$unix(r0, &(0x7f0000000200), &(0x7f0000000180)=0x6e) r1 = open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'bridge0\x00'}) 02:46:58 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x17c10fd6) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r1, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:46:58 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) [ 855.334720] audit: type=1326 audit(1712630818.531:897): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f5b4cfe469c code=0x7ffc0000 [ 855.338295] audit: type=1326 audit(1712630818.534:898): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 [ 855.340225] audit: type=1326 audit(1712630818.536:899): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f5b4cfe472b code=0x7ffc0000 [ 855.342519] audit: type=1326 audit(1712630818.538:900): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 855.349558] audit: type=1326 audit(1712630818.538:901): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6821 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 855.430910] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 855.432486] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 02:47:16 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:47:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 15) 02:47:16 executing program 2: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000002c0)={0x2000000d, 0x4, 0x7, 0x18, 0x3, 0x9, 0x200004, 0x7d}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x4, 0x4, 0x9, 0x7, 0x2, 0x6, 0xfffffe00, 0x2cc, 0x40, 0x2b2, 0x2, 0x100, 0x38, 0x2, 0x6, 0xe0c0, 0x2}, [{0x6474e555, 0x80000001, 0xd6a3, 0x628, 0xc9, 0xb8, 0x6, 0xffff}, {0x2, 0x81, 0x7, 0x9, 0x6, 0xffffffff, 0x0, 0x2}], "9903c11d4b99c52c63cd7e14aa32cf6f5979ac227fb3e949bf6080538dbc6c1bb87dfc44f3cee92984e3ee7518fef951b853396f37dfe18d376895c45fd13799f6bab49057a477ed0330007fdb407dfa8627bee65b99f1159238eaf5bfdc5bd86d1b5c2dfdbbbc5d573d9376d963c13bc7cfc4a1b9c617fd60de28ce4e473ae54b82c4eee550cc4197416949a3a1f742832366eeb666603066235c43a4464a20ef98ecf0c6ec6c672bab3cb8fe8a30379393b6d20cda37716dadb52b13d5598d20973c7895dac14b5b8d4531374d1919c0f0c659b5a47ae09746aa0a1e7944dfa04ce13ded4a876146b72883", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x2, 0x1, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:47:16 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:47:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[], 0xfdef) (fail_nth: 4) 02:47:16 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:47:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x640102, 0x2c) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='ntfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x800, 0x6, 0x0, 0x3f, 0x11, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x50, r0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f0000000200)={r2, r3+60000000}, 0x1, 0x1}, 0x204) r4 = syz_io_uring_setup(0x457e, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x1, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000180)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x59f5ee0a7c70a1ba, 0x0, @fd=r4, 0x3, 0x0, 0x1, 0x0, 0x1, {0x0, r7}}, 0xbd53) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_FADVISE={0x18, 0x7, 0x0, @fd_index=0x1, 0xd731, 0x0, 0x0, 0x0, 0x1, {0x0, r7}}, 0x9) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0xc000, 0x7) 02:47:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@remote, @multicast2}, 0x10) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) signalfd(r0, &(0x7f0000000180), 0x8) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x7}}, './file0\x00'}) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr=0x64010100, @local}, {0x16, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) [ 873.495176] audit: type=1326 audit(1712630836.691:902): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6867 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 873.498910] audit: type=1326 audit(1712630836.691:903): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6867 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 873.504531] audit: type=1326 audit(1712630836.692:904): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6867 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 873.506505] FAULT_INJECTION: forcing a failure. [ 873.506505] name failslab, interval 1, probability 0, space 0, times 0 [ 873.510073] CPU: 0 PID: 6881 Comm: syz-executor.0 Not tainted 5.10.214 #1 [ 873.511066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.512289] Call Trace: [ 873.512681] dump_stack+0x107/0x167 [ 873.513214] should_fail.cold+0x5/0xa [ 873.513773] ? tty_buffer_alloc+0x243/0x2b0 [ 873.514406] should_failslab+0x5/0x20 [ 873.514972] __kmalloc+0x72/0x390 [ 873.515486] tty_buffer_alloc+0x243/0x2b0 [ 873.516104] __tty_buffer_request_room+0x156/0x2a0 [ 873.516841] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 873.517641] ? n_tty_write+0x1eb/0xfe0 [ 873.518215] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 873.518553] audit: type=1326 audit(1712630836.693:905): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6867 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 873.519079] pty_write+0xe6/0x110 [ 873.519101] n_tty_write+0x416/0xfe0 [ 873.523207] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 873.523950] ? _copy_from_iter+0x37b/0xe80 [ 873.524569] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 873.525297] ? __virt_addr_valid+0x170/0x5c0 [ 873.525937] ? __check_object_size+0x319/0x440 [ 873.526602] file_tty_write.constprop.0+0x529/0x910 [ 873.527329] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 873.528066] new_sync_write+0x42c/0x660 [ 873.528653] ? new_sync_read+0x6f0/0x6f0 [ 873.529248] ? _cond_resched+0x12/0x80 [ 873.529815] ? avc_policy_seqno+0x9/0x70 [ 873.530405] ? selinux_file_permission+0x92/0x520 [ 873.531105] ? __fget_files+0x296/0x4c0 [ 873.531692] vfs_write+0x747/0xa70 [ 873.532249] ksys_write+0x12d/0x260 [ 873.532782] ? __ia32_sys_read+0xb0/0xb0 [ 873.533378] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 873.534139] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.534893] do_syscall_64+0x33/0x40 [ 873.535435] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 873.536181] RIP: 0033:0x7fcf7d41ab19 [ 873.536721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.539374] RSP: 002b:00007fcf7a990188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 873.540509] RAX: ffffffffffffffda RBX: 00007fcf7d52df60 RCX: 00007fcf7d41ab19 [ 873.541544] RDX: 000000000000fdef RSI: 0000000020000c80 RDI: 0000000000000004 [ 873.542577] RBP: 00007fcf7a9901d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.543612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.544650] R13: 00007ffdf360c15f R14: 00007fcf7a990300 R15: 0000000000022000 [ 873.545726] [ 873.545735] ====================================================== [ 873.545743] WARNING: possible circular locking dependency detected [ 873.545748] 5.10.214 #1 Not tainted [ 873.545756] ------------------------------------------------------ [ 873.545763] syz-executor.0/6881 is trying to acquire lock: [ 873.545769] ffffffff84f0cdc0 (console_owner){-.-.}-{0:0}, at: vprintk_emit+0x2ca/0x4d0 [ 873.545791] [ 873.545797] but task is already holding lock: [ 873.545802] ffff88801b1e4958 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 873.545825] [ 873.545831] which lock already depends on the new lock. [ 873.545834] [ 873.545837] [ 873.545844] the existing dependency chain (in reverse order) is: [ 873.545847] [ 873.545850] -> #2 (&port->lock){-.-.}-{2:2}: [ 873.545871] _raw_spin_lock_irqsave+0x36/0x60 [ 873.545877] tty_port_tty_get+0x1f/0x100 [ 873.545883] tty_port_default_wakeup+0x11/0x40 [ 873.545889] serial8250_tx_chars+0x51f/0xb00 [ 873.545895] serial8250_handle_irq+0x4e4/0x660 [ 873.545902] serial8250_default_handle_irq+0x96/0x210 [ 873.545908] serial8250_interrupt+0xf4/0x1b0 [ 873.545914] __handle_irq_event_percpu+0x2ef/0x6d0 [ 873.545920] handle_irq_event+0xff/0x280 [ 873.545926] handle_edge_irq+0x249/0xd00 [ 873.545932] asm_call_irq_on_stack+0x12/0x20 [ 873.545937] common_interrupt+0xdd/0x1a0 [ 873.545943] asm_common_interrupt+0x1e/0x40 [ 873.545948] default_idle+0xe/0x20 [ 873.545954] default_idle_call+0xbf/0x2c0 [ 873.545959] do_idle+0x3ad/0x520 [ 873.545965] cpu_startup_entry+0x14/0x20 [ 873.545972] secondary_startup_64_no_verify+0xc2/0xcb [ 873.545974] [ 873.545977] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 873.545999] _raw_spin_lock_irqsave+0x36/0x60 [ 873.546005] serial8250_console_write+0x9f5/0xc60 [ 873.546010] console_unlock+0x82a/0xb40 [ 873.546016] register_console+0x53d/0x800 [ 873.546022] univ8250_console_init+0x3a/0x4a [ 873.546028] console_init+0x24c/0x356 [ 873.546033] start_kernel+0x2e6/0x489 [ 873.546039] secondary_startup_64_no_verify+0xc2/0xcb [ 873.546042] [ 873.546045] -> #0 (console_owner){-.-.}-{0:0}: [ 873.546066] __lock_acquire+0x29e7/0x5b00 [ 873.546072] lock_acquire+0x197/0x470 [ 873.546077] vprintk_emit+0x307/0x4d0 [ 873.546082] vprintk_func+0x8b/0x140 [ 873.546087] printk+0xba/0xf1 [ 873.546092] should_fail+0x47a/0x5a0 [ 873.546098] should_failslab+0x5/0x20 [ 873.546103] __kmalloc+0x72/0x390 [ 873.546109] tty_buffer_alloc+0x243/0x2b0 [ 873.546115] __tty_buffer_request_room+0x156/0x2a0 [ 873.546122] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 873.546130] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 873.546135] pty_write+0xe6/0x110 [ 873.546140] n_tty_write+0x416/0xfe0 [ 873.546146] file_tty_write.constprop.0+0x529/0x910 [ 873.546152] new_sync_write+0x42c/0x660 [ 873.546157] vfs_write+0x747/0xa70 [ 873.546163] ksys_write+0x12d/0x260 [ 873.546168] do_syscall_64+0x33/0x40 [ 873.546174] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 873.546177] [ 873.546183] other info that might help us debug this: [ 873.546186] [ 873.546190] Chain exists of: [ 873.546193] console_owner --> &port_lock_key --> &port->lock [ 873.546219] [ 873.546224] Possible unsafe locking scenario: [ 873.546227] [ 873.546233] CPU0 CPU1 [ 873.546238] ---- ---- [ 873.546242] lock(&port->lock); [ 873.546255] lock(&port_lock_key); [ 873.546269] lock(&port->lock); [ 873.546280] lock(console_owner); [ 873.546290] [ 873.546295] *** DEADLOCK *** [ 873.546297] [ 873.546303] 5 locks held by syz-executor.0/6881: [ 873.546306] #0: ffff8880478f6098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x90 [ 873.546332] #1: ffff8880478f6130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: file_tty_write.constprop.0+0x29f/0x910 [ 873.546360] #2: ffff8880478f62e8 (&o_tty->termios_rwsem/1){++++}-{3:3}, at: n_tty_write+0x1bf/0xfe0 [ 873.546389] #3: ffffc90000769378 (&ldata->output_lock){+.+.}-{3:3}, at: n_tty_write+0x542/0xfe0 [ 873.546416] #4: ffff88801b1e4958 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 873.546442] [ 873.546446] stack backtrace: [ 873.546454] CPU: 0 PID: 6881 Comm: syz-executor.0 Not tainted 5.10.214 #1 [ 873.546464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.546467] Call Trace: [ 873.546472] dump_stack+0x107/0x167 [ 873.546477] check_noncircular+0x263/0x2e0 [ 873.546483] ? stack_trace_consume_entry+0x160/0x160 [ 873.546489] ? print_circular_bug+0x470/0x470 [ 873.546494] ? alloc_chain_hlocks+0x342/0x5a0 [ 873.546500] __lock_acquire+0x29e7/0x5b00 [ 873.546506] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 873.546511] ? SOFTIRQ_verbose+0x10/0x10 [ 873.546517] ? __lockdep_reset_lock+0x180/0x180 [ 873.546522] ? lock_acquire+0x197/0x470 [ 873.546527] lock_acquire+0x197/0x470 [ 873.546532] ? vprintk_emit+0x2ca/0x4d0 [ 873.546537] ? lock_release+0x680/0x680 [ 873.546542] ? lock_downgrade+0x6d0/0x6d0 [ 873.546548] ? do_raw_spin_lock+0x121/0x260 [ 873.546553] ? rwlock_bug.part.0+0x90/0x90 [ 873.546558] vprintk_emit+0x307/0x4d0 [ 873.546563] ? vprintk_emit+0x2ca/0x4d0 [ 873.546568] vprintk_func+0x8b/0x140 [ 873.546572] printk+0xba/0xf1 [ 873.546578] ? record_print_text.cold+0x16/0x16 [ 873.546582] should_fail+0x47a/0x5a0 [ 873.546588] ? tty_buffer_alloc+0x243/0x2b0 [ 873.546593] should_failslab+0x5/0x20 [ 873.546597] __kmalloc+0x72/0x390 [ 873.546603] tty_buffer_alloc+0x243/0x2b0 [ 873.546609] __tty_buffer_request_room+0x156/0x2a0 [ 873.546615] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 873.546620] ? n_tty_write+0x1eb/0xfe0 [ 873.546627] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 873.546631] pty_write+0xe6/0x110 [ 873.546636] n_tty_write+0x416/0xfe0 [ 873.546642] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 873.546648] ? _copy_from_iter+0x37b/0xe80 [ 873.546654] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 873.546659] ? __virt_addr_valid+0x170/0x5c0 [ 873.546665] ? __check_object_size+0x319/0x440 [ 873.546671] file_tty_write.constprop.0+0x529/0x910 [ 873.546677] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 873.546682] new_sync_write+0x42c/0x660 [ 873.546687] ? new_sync_read+0x6f0/0x6f0 [ 873.546692] ? _cond_resched+0x12/0x80 [ 873.546697] ? avc_policy_seqno+0x9/0x70 [ 873.546703] ? selinux_file_permission+0x92/0x520 [ 873.546708] ? __fget_files+0x296/0x4c0 [ 873.546713] vfs_write+0x747/0xa70 [ 873.546717] ksys_write+0x12d/0x260 [ 873.546723] ? __ia32_sys_read+0xb0/0xb0 [ 873.546729] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 873.546735] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.546740] do_syscall_64+0x33/0x40 [ 873.546746] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 873.546751] RIP: 0033:0x7fcf7d41ab19 [ 873.546770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.546777] RSP: 002b:00007fcf7a990188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 873.546790] RAX: ffffffffffffffda RBX: 00007fcf7d52df60 RCX: 00007fcf7d41ab19 [ 873.546798] RDX: 000000000000fdef RSI: 0000000020000c80 RDI: 0000000000000004 [ 873.546807] RBP: 00007fcf7a9901d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.546815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.546823] R13: 00007ffdf360c15f R14: 00007fcf7a990300 R15: 0000000000022000 [ 873.605039] audit: type=1326 audit(1712630836.693:906): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6867 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 873.661461] FAULT_INJECTION: forcing a failure. [ 873.661461] name failslab, interval 1, probability 0, space 0, times 0 [ 873.663367] CPU: 1 PID: 6875 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 873.664426] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.665696] Call Trace: [ 873.666108] dump_stack+0x107/0x167 [ 873.666678] should_fail.cold+0x5/0xa [ 873.667271] should_failslab+0x5/0x20 [ 873.667864] __kmalloc_node_track_caller+0x74/0x3b0 [ 873.668641] ? audit_log_start.part.0+0x2a3/0x730 [ 873.669390] __alloc_skb+0xb1/0x5b0 [ 873.669957] audit_log_start.part.0+0x2a3/0x730 [ 873.670675] ? audit_log_task_context+0x170/0x170 [ 873.671416] ? audit_filter+0x5d6/0xb10 [ 873.672041] ? __bpf_prog_run64+0xe0/0xe0 [ 873.672679] ? audit_compare_dname_path+0x120/0x120 [ 873.673452] ? security_file_permission+0x24e/0x570 [ 873.674223] audit_log_start+0x5f/0x90 [ 873.675061] audit_seccomp+0x5d/0x200 [ 873.675658] __seccomp_filter+0x669/0x1530 [ 873.676323] ? seccomp_notify_ioctl+0xda0/0xda0 [ 873.677054] ? vfs_copy_file_range+0x1290/0x1290 [ 873.677786] ? ksys_write+0x1a9/0x260 [ 873.678368] __secure_computing+0x191/0x2f0 [ 873.679032] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 873.679852] do_syscall_64+0xf/0x40 [ 873.680430] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 873.681218] RIP: 0033:0x7f5b4cfe469c 02:47:16 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:47:16 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x300, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x6c}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x18400, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) 02:47:16 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:47:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x17c10fd6) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[], 0xfdef) (fail_nth: 5) [ 873.681791] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 873.684727] RSP: 002b:00007f5b4a5a7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 873.685862] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b4cfe469c [ 873.686911] RDX: 000000000000000f RSI: 00007f5b4a5a71e0 RDI: 0000000000000005 [ 873.687978] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.689033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 873.690088] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 [ 873.691218] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 873.692278] audit: out of memory in audit_log_start [ 873.729970] audit: type=1326 audit(1712630836.801:907): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6867 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4d031b19 code=0x7ffc0000 [ 873.742590] audit: type=1326 audit(1712630836.857:908): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6867 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5b4cfe4a04 code=0x7ffc0000 [ 873.756574] audit: type=1326 audit(1712630836.857:909): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6867 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b4cfe45ff code=0x7ffc0000 02:47:16 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) write$binfmt_elf64(r1, &(0x7f0000000c80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="b875bc8a434d70e9d606c4a9ee5ae4d8a5ae2e3838584c3256192c67877194946b5984cbc3bb7d43e03885f9ecf682bed6a5ce69eec82bee52996175160c5c2eaa86d86e7e4b421e2a10d58a1d5c321d2f135ebc8af195f1a79284d62ecb47a0189d8a10ceaa36ea8c74807ac50a11b88b0ad314616ba82c32e14c3ab5d71ab2f8e30ccddb808e30fd8ebd01541cd31c6a558cdde2295d38915178626ecc193ae32a807ab04c8295bb0b5a2d428d373dba40e905a28a4c68673e238f448a5ebf093894afd3aad97cd059b3aae31276e233b84f562f6b7f413a312776b1d292b1", @ANYBLOB="a8ed3e9fa90f8f507f1010f20ff65f8541c95b0e01269b3f49ce7efd51fd62d56aefae24dbfe9c803b4688ff6ef34bf7f378cf252397", @ANYRESOCT, @ANYBLOB="7909cd89cd0319d66847a91bf739cf944662adf04bcec393cac9f7032f366334296db19a01b6ebb9e10856ba3a461bf37fb94ce352067416f084f217241ff3a0120063c4ad3659126e2406945d14367632f9644490635c31de8bcad0f97d02c708330520a707595409d37cf6471a0d6c61de6a1709d548540759c9897a5492732b7cb8b80d1e485044c282ce1b82fb449ccd8bd66b6fdbf80ef0f926098872b36829dbd5f2ac02cd46188dd517a692f05f5542766645e6be6943b52d8cf3e09d36702e82d823fa7a8f4569e5aa47d98d0a46eb05285a7dfa87026c0e", @ANYBLOB="388e1ba9930fc45947eec381b4bf04dcc8beac881735eda43e6cf69d163390fa40955470a10504929051ecbd6d062a9ab9d58ea230842cc6021cc77c35fdf13bd58e95b633a6abd75ea00388e84171", @ANYRESHEX], 0xfdef) 02:47:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) (fail_nth: 16) [ 873.818110] FAULT_INJECTION: forcing a failure. [ 873.818110] name failslab, interval 1, probability 0, space 0, times 0 [ 873.819782] CPU: 0 PID: 6902 Comm: syz-executor.0 Not tainted 5.10.214 #1 [ 873.820786] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.821983] Call Trace: [ 873.822373] dump_stack+0x107/0x167 [ 873.822901] should_fail.cold+0x5/0xa [ 873.823463] ? create_object.isra.0+0x3a/0xa20 [ 873.824143] should_failslab+0x5/0x20 [ 873.824699] kmem_cache_alloc+0x5b/0x310 [ 873.825293] create_object.isra.0+0x3a/0xa20 [ 873.825934] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 873.826675] __kmalloc+0x16e/0x390 [ 873.827200] tty_buffer_alloc+0x243/0x2b0 [ 873.827803] __tty_buffer_request_room+0x156/0x2a0 [ 873.828527] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 873.829318] ? n_tty_write+0x1eb/0xfe0 [ 873.829889] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 873.830746] pty_write+0xe6/0x110 [ 873.831247] n_tty_write+0x416/0xfe0 [ 873.831803] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 873.832531] ? _copy_from_iter+0x37b/0xe80 [ 873.833147] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 873.833882] ? __virt_addr_valid+0x170/0x5c0 [ 873.834529] ? __check_object_size+0x319/0x440 [ 873.835193] file_tty_write.constprop.0+0x529/0x910 [ 873.835927] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 873.836657] new_sync_write+0x42c/0x660 [ 873.837234] ? new_sync_read+0x6f0/0x6f0 [ 873.837827] ? _cond_resched+0x12/0x80 [ 873.838399] ? avc_policy_seqno+0x9/0x70 [ 873.838986] ? selinux_file_permission+0x92/0x520 [ 873.839689] ? __fget_files+0x296/0x4c0 [ 873.840280] vfs_write+0x747/0xa70 [ 873.840803] ksys_write+0x12d/0x260 [ 873.841334] ? __ia32_sys_read+0xb0/0xb0 [ 873.841932] ? fpregs_assert_state_consistent+0xb9/0xe0 [ 873.842700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.843450] do_syscall_64+0x33/0x40 [ 873.843996] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 873.844735] RIP: 0033:0x7fcf7d41ab19 [ 873.845273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.847924] RSP: 002b:00007fcf7a990188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 873.849022] RAX: ffffffffffffffda RBX: 00007fcf7d52df60 RCX: 00007fcf7d41ab19 [ 873.850050] RDX: 000000000000fdef RSI: 0000000020000c80 RDI: 0000000000000004 [ 873.851080] RBP: 00007fcf7a9901d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.852113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.853142] R13: 00007ffdf360c15f R14: 00007fcf7a990300 R15: 0000000000022000 02:47:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x640102, 0x2c) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='ntfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x800, 0x6, 0x0, 0x3f, 0x11, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x50, r0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) syz_io_uring_submit(r1, 0x0, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x4, 0x0, 0x0, 0x8, &(0x7f0000000200)={r2, r3+60000000}, 0x1, 0x1}, 0x204) r4 = syz_io_uring_setup(0x457e, &(0x7f00000000c0)={0x0, 0x58c9, 0x2, 0x1, 0x8b}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000180)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000300)=@IORING_OP_FALLOCATE={0x11, 0x59f5ee0a7c70a1ba, 0x0, @fd=r4, 0x3, 0x0, 0x1, 0x0, 0x1, {0x0, r7}}, 0xbd53) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_FADVISE={0x18, 0x7, 0x0, @fd_index=0x1, 0xd731, 0x0, 0x0, 0x0, 0x1, {0x0, r7}}, 0x9) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0xc000, 0x7) [ 873.898149] FAULT_INJECTION: forcing a failure. [ 873.898149] name failslab, interval 1, probability 0, space 0, times 0 [ 873.899964] CPU: 1 PID: 6908 Comm: syz-executor.4 Not tainted 5.10.214 #1 [ 873.900971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.902191] Call Trace: [ 873.902593] dump_stack+0x107/0x167 [ 873.903134] should_fail.cold+0x5/0xa [ 873.903710] should_failslab+0x5/0x20 [ 873.904311] __kmalloc_node_track_caller+0x74/0x3b0 [ 873.905058] ? audit_log_start.part.0+0x2a3/0x730 [ 873.905779] __alloc_skb+0xb1/0x5b0 [ 873.906325] audit_log_start.part.0+0x2a3/0x730 [ 873.907021] ? audit_log_task_context+0x170/0x170 [ 873.907735] ? audit_filter+0x5d6/0xb10 [ 873.908334] ? __bpf_prog_run64+0xe0/0xe0 [ 873.908945] ? audit_compare_dname_path+0x120/0x120 [ 873.909698] ? security_file_permission+0x24e/0x570 [ 873.910446] audit_log_start+0x5f/0x90 [ 873.911028] audit_seccomp+0x5d/0x200 [ 873.911602] __seccomp_filter+0x669/0x1530 [ 873.912239] ? seccomp_notify_ioctl+0xda0/0xda0 [ 873.912950] ? vfs_copy_file_range+0x1290/0x1290 [ 873.913649] ? ksys_write+0x1a9/0x260 [ 873.914216] __secure_computing+0x191/0x2f0 [ 873.914862] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 873.915659] do_syscall_64+0xf/0x40 [ 873.916205] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 873.916964] RIP: 0033:0x7f5b4cfe469c [ 873.917522] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 873.920237] RSP: 002b:00007f5b4a5a7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 873.921365] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b4cfe469c [ 873.922421] RDX: 000000000000000f RSI: 00007f5b4a5a71e0 RDI: 0000000000000005 [ 873.923476] RBP: 00007f5b4a5a71d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.924538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 873.925591] R13: 00007fff5c953e3f R14: 00007f5b4a5a7300 R15: 0000000000022000 VM DIAGNOSIS: 02:47:16 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822d05c1 RDI=ffffffff879eb280 RBP=ffffffff879eb240 RSP=ffff88806ce09c90 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000020 R13=0000000000000020 R14=ffffffff879eb240 R15=dffffc0000000000 RIP=ffffffff822d0618 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fcf7a990700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020001000 CR3=00000000471a4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=ffffffffffffffffffffffffffffff00 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff814d0f87 RBX=dffffc0000000000 RCX=1ffff1100197cff3 RDX=0000000000000000 RSI=ffffffff814cddce RDI=ffffffff84bdf0c0 RBP=ffff88800cbe7cd0 RSP=ffff88800cbe7c08 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=00000000000000b4 R13=ffffed100197cf9c R14=ffff88800cbe7cd0 R15=ffffc900006c7058 RIP=ffffffff814d0f87 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f3ee35df8c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc20535a6f4 CR3=000000000d094000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffff0f0e0d0c0b0a0908 XMM01=0000000000000000696c61766e49002f XMM02=00007f3ee3b5ebe000007f3ee3b5ebe0 XMM03=00000000000000b10000000000000000 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=0000559a7c4f4fa00000559a7c512110 XMM06=0000559a7c4ce370ffffffff00000002 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000